Skip to main content

Showing 1–18 of 18 results for author: Shah-Mansouri, V

.
  1. arXiv:2401.08861  [pdf, other

    cs.NI cs.LG math.NA

    Semi-Supervised Learning Approach for Efficient Resource Allocation with Network Slicing in O-RAN

    Authors: Salar Nouri, Mojdeh Karbalaee Motalleb, Vahid Shah-Mansouri, Seyed Pooya Shariatpanahi

    Abstract: The Open Radio Access Network (O-RAN) technology has emerged as a promising solution for network operators, providing them with an open and favorable environment. Ensuring effective coordination of x-applications (xAPPs) is crucial to enhance flexibility and optimize network performance within the O-RAN. In this paper, we introduce an innovative approach to the resource allocation problem, aiming… ▽ More

    Submitted 16 January, 2024; originally announced January 2024.

    Comments: Submitted to IEEE Transactions on Network and Service Management

  2. arXiv:2311.02657  [pdf, other

    cs.DC

    GSC: Generalizable Service Coordination

    Authors: Farzad Mohammadi, Vahid Shah-Mansouri

    Abstract: Services with distributed and interdependent components are becoming a popular option for harnessing dispersed resources available on cloud and edge networks. However, effective deployment and management of these services, namely service coordination, is a challenging task. Service coordination comprises the placement and scalability of components and scheduling incoming traffic requesting for ser… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 9 pages, 4 figures

  3. arXiv:2309.13444  [pdf, other

    cs.CR

    Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture

    Authors: Mojdeh Karbalaee Motalleb, Chafika Benzaïd, Tarik Taleb, Vahid Shah-Mansouri

    Abstract: The open radio access network (O-RAN) architecture's native virtualization and embedded intelligence facilitate RAN slicing and enable comprehensive end-to-end services in post-5G networks. However, any vulnerabilities could harm security. Therefore, artificial intelligence (AI) and machine learning (ML) security threats can even threaten O-RAN benefits. This paper proposes a novel approach to est… ▽ More

    Submitted 23 September, 2023; originally announced September 2023.

    Comments: 6 pages

  4. arXiv:2307.16406  [pdf, ps, other

    cs.IT

    Traffic Offloading Probability for Integrated LEO Satellite-Terrestrial Networks

    Authors: Hossein Akhlaghpasand, Vahid Shah-Mansouri

    Abstract: In this paper, we consider traffic offloading of integrated low earth orbit (LEO) satellite-terrestrial network. We first derive traffic offloading probability from the terrestrial network to the LEO satellite network based on the instantaneous radio signal strength. Then to overcome limited coverage and also traffic congestion of the terrestrial network, we design an optimal satellite network in… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 11 pages, 2 figures, appear in IEEE Communications Letters

  5. arXiv:2212.05777  [pdf, other

    cs.CE cs.HC

    Design and Evaluation of Crowd-sourcing Platforms Based on Users Confidence Judgments

    Authors: Samin Nili Ahmadabadi, Maryam Haghifam, Vahid Shah-Mansouri, Sara Ershadmanesh

    Abstract: Crowd-sourcing deals with solving problems by assigning them to a large number of non-experts called crowd using their spare time. In these systems, the final answer to the question is determined by summing up the votes obtained from the community. The popularity of using these systems has increased by facilitation of access to community members through mobile phones and the Internet. One of the i… ▽ More

    Submitted 2 July, 2024; v1 submitted 12 December, 2022; originally announced December 2022.

  6. arXiv:2106.06692  [pdf

    cs.NI

    Delay Analysis of Base Station Flow Table in SDN-enabled Radio Access Networks

    Authors: Seyed Hamed Rastegar, Aliazam Abbasfar, Vahid Shah-Mansouri

    Abstract: Future generation wireless networks are designed with extremely low delay requirements which makes even small contributed delays important. On the other hand, software defined networking (SDN) has been introduced as a key enabler of future wireless and cellular networks in order to make them more flexible. In SDN, a central controller manages all network equipments by setting the match-action pair… ▽ More

    Submitted 12 June, 2021; originally announced June 2021.

    Comments: 3 pages, 3 figures

  7. Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation

    Authors: Hojjat Navidan, Parisa Fard Moshiri, Mohammad Nabati, Reza Shahbazian, Seyed Ali Ghorashi, Vahid Shah-Mansouri, David Windridge

    Abstract: Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extensively researched machine learning sub-field for the creation of synthetic data through deep generative modeling. GANs have consequently been applied in a number of domains, most notably computer vision, in which they are typically used to generate or transform synthetic images. Given their relative… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

    Comments: Accepted for publication at Journal of Computer Networks

  8. arXiv:2007.13230  [pdf, other

    cs.NI

    Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks

    Authors: Reza Moosavi, Saeedeh Parsaeefard, Mohammad Ali Maddah-Ali, Vahid Shah-Mansouri, Babak Hossein Khalaj, Mehdi Bennis

    Abstract: Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility. However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during… ▽ More

    Submitted 17 October, 2020; v1 submitted 26 July, 2020; originally announced July 2020.

  9. arXiv:2001.03665  [pdf, other

    cs.NI cs.LG

    Classification of Traffic Using Neural Networks by Rejecting: a Novel Approach in Classifying VPN Traffic

    Authors: Ali Parchekani, Salar Nouri, Vahid Shah-Mansouri, Seyed Pooya Shariatpanahi

    Abstract: In this paper, we introduce a novel end-to-end traffic classification method to distinguish between traffic classes including VPN traffic in three layers of the Open Systems Interconnection (OSI) model. Classification of VPN traffic is not trivial using traditional classification approaches due to its encrypted nature. We utilize two well-known neural networks, namely multi-layer perceptron and re… ▽ More

    Submitted 10 December, 2021; v1 submitted 10 January, 2020; originally announced January 2020.

  10. arXiv:1911.06532  [pdf, ps, other

    cs.NI

    A Dynamic Reliability-Aware Service Placement for Network Function Virtualization (NFV)

    Authors: Mohammad Karimzadeh Farshbafan, Vahid Shah-Mansouri, Dusit Niyato

    Abstract: Network softwarization is one of the major paradigm shifts in the next generation of networks. It enables programmable and flexible management and deployment of the network. Network function virtualization (NFV) is referred to the deployment of software functions running on commodity servers instead of traditional hardware-based middle-boxes. It is an example of network softwarization. In NFV, a s… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

  11. arXiv:1911.01904  [pdf, other

    cs.NI eess.SP

    Joint Power Allocation and Network Slicing in an Open RAN System

    Authors: Mojdeh Karbalaee Motalleb, Vahid Shah-Mansouri, Salar Nouri Naghadeh

    Abstract: Open radio access network (ORAN) alliance which has been formed recently establishes a flexible, open, and smart radio access network (RAN) by combing the ideas from xRAN and cloud RAN (C-RAN). ORAN divides the functions of the RAN into three parts, namely remote unit (RU), distributed unit (DU), and central unit (CU). While RU contains lower PHY functions, DU contains higher PHY, MAC, and RLC and… ▽ More

    Submitted 5 November, 2019; originally announced November 2019.

  12. arXiv:1911.01283  [pdf, other

    cs.NI eess.SY

    Reactive Failure Mitigation through Seamless Migration in Telecom Infrastructure Networks

    Authors: Mahdi Soleimani, Vahid Shah-Mansouri

    Abstract: Various methods are proposed in the literature to mitigate the failures in an infrastructure network. Failure mitigation can be carried out in an active or passive manner. In active manner, live backups provide the required reliability. Due to the high cost of active backups, failures can be mitigated in a reactive manner where mitigation starts when a function fails. In this paper, network functi… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

    Comments: 7 pages, 5 figures, submitted to IEEE ICC Conference 2020

  13. Analysis of Distributed ADMM Algorithm for Consensus Optimization in Presence of Node Error

    Authors: Layla Majzoobi, Farshad Lahouti, Vahid Shah-Mansouri

    Abstract: Alternating Direction Method of Multipliers (ADMM) is a popular convex optimization algorithm, which can be employed for solving distributed consensus optimization problems. In this setting agents locally estimate the optimal solution of an optimization problem and exchange messages with their neighbors over a connected network. The distributed algorithms are typically exposed to different types o… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  14. arXiv:1812.00737  [pdf, ps, other

    cs.NI

    Deep Q-Learning for Dynamic Reliability Aware NFV-Based Service Provisioning

    Authors: Hamed Rahmani Khezri, Puria Azadi Moghadam, Mohammad Karimzadeh Farshbafan, Vahid Shah-Mansouri, Hamed Kebriaei, Dusit Niyato

    Abstract: Network function virtualization (NFV) is referred to the technology in which softwarized network functions virtually run on commodity servers. Such functions are called virtual network functions (VNFs). A specific service is composed of a set of VNFs. This is a paradigm shift for service provisioning in telecom networks which introduces new design and implementation challenges. One of these challe… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

  15. arXiv:1806.10464  [pdf, ps, other

    cs.IT cs.GT

    Game-Theoretic Spectrum Trading in RF Relay-Assisted Free-Space Optical Communications

    Authors: Shenjie Huang, Vahid Shah-Mansouri, Majid Safari

    Abstract: This work proposes a novel hybrid RF/FSO system based on a game theoretic spectrum trading process. It is assumed that no RF spectrum is preallocated to the FSO link and only when the link availability is severely impaired by the infrequent adverse weather conditions, i.e. fog, etc., the source can borrow a portion of licensed RF spectrum from one of the surrounding RF nodes. Using the leased spec… ▽ More

    Submitted 27 June, 2018; originally announced June 2018.

  16. arXiv:1611.08546   

    cs.NI cs.IT

    Joint Throughput Maximization and Power Control in Poisson CoopMAC Networks

    Authors: Masoumeh Sadeghi, Homa Nikbakht, Amir Masoud Rabiei, Vahid Shah-Mansouri

    Abstract: A cooperative medium access control (CoopMAC) network with randomly distributed helpers is considered. We introduce a new helper selection scheme which maximizes the average throughput while maintaining a low power consumption profile in the network. To this end, all transmissions are assumed to be performed using power control. We assume that each node can estimate the channel between itself and… ▽ More

    Submitted 13 December, 2016; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: This paper has been withdrawn by the author due to some modifications needed to be done

  17. arXiv:1611.03336   

    cs.NI

    Exact Throughput Analysis of Random CoopMAC Networks in the Presence of Shadowing

    Authors: Homa Nikbakht, Amir Masoud Rabiei, Vahid Shah-Mansouri

    Abstract: The throughput performance of a random cooperative medium access control (CoopMAC) network in the presence of shadowing is considered. The nodes are assumed to be randomly distributed according to a homogeneous two-dimensional Poisson point process with constant intensity. The conditions under which a helper can improve the transmission rate between a given pair of nodes are examined. Based on the… ▽ More

    Submitted 17 December, 2016; v1 submitted 10 November, 2016; originally announced November 2016.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in equation 21

  18. arXiv:1610.00974  [pdf, ps, other

    cs.NI

    A New Approach for Helper Selection and Performance Analysis in Poisson CoopMAC Networks

    Authors: Homa Nikbakht, Amir Masoud Rabiei, Vahid Shah-Mansouri

    Abstract: The cooperative medium access control (CoopMAC) protocol in the presence of randomly-distributed nodes and shadowing is considered. The nodes are assumed to be distributed according to a homogeneous two-dimensional Poisson point process. A new approach is proposed for helper selection and throughput performance analysis which depends on the shadowing parameters as well as the distribution of helpe… ▽ More

    Submitted 4 October, 2016; originally announced October 2016.