-
Semi-Supervised Learning Approach for Efficient Resource Allocation with Network Slicing in O-RAN
Authors:
Salar Nouri,
Mojdeh Karbalaee Motalleb,
Vahid Shah-Mansouri,
Seyed Pooya Shariatpanahi
Abstract:
The Open Radio Access Network (O-RAN) technology has emerged as a promising solution for network operators, providing them with an open and favorable environment. Ensuring effective coordination of x-applications (xAPPs) is crucial to enhance flexibility and optimize network performance within the O-RAN. In this paper, we introduce an innovative approach to the resource allocation problem, aiming…
▽ More
The Open Radio Access Network (O-RAN) technology has emerged as a promising solution for network operators, providing them with an open and favorable environment. Ensuring effective coordination of x-applications (xAPPs) is crucial to enhance flexibility and optimize network performance within the O-RAN. In this paper, we introduce an innovative approach to the resource allocation problem, aiming to coordinate multiple independent xAPPs for network slicing and resource allocation in O-RAN. Our proposed method focuses on maximizing the weighted throughput among user equipments (UE), as well as allocating physical resource blocks (PRBs). We prioritize two service types, namely enhanced Mobile Broadband and Ultra Reliable Low Latency Communication. To achieve this, we have designed two xAPPs: a power control xAPP for each UE and a PRB allocation xAPP. The proposed method consists of a two-part training phase, where the first part uses supervised learning with a Variational Autoencoder trained to regress the power transmission as well as the user association and PRB allocation decisions, and the second part uses unsupervised learning with a contrastive loss approach to improve the generalization and robustness of the model. We evaluate the performance of our proposed method by comparing its results to those obtained from an exhaustive search algorithm, deep Q-network algorithm, and by reporting performance metrics for the regression task. We also evaluate the proposed model's performance in different scenarios among the service types. The results show that the proposed method is a more efficient and effective solution for network slicing problems compared to state-of-the-art methods.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
GSC: Generalizable Service Coordination
Authors:
Farzad Mohammadi,
Vahid Shah-Mansouri
Abstract:
Services with distributed and interdependent components are becoming a popular option for harnessing dispersed resources available on cloud and edge networks. However, effective deployment and management of these services, namely service coordination, is a challenging task. Service coordination comprises the placement and scalability of components and scheduling incoming traffic requesting for ser…
▽ More
Services with distributed and interdependent components are becoming a popular option for harnessing dispersed resources available on cloud and edge networks. However, effective deployment and management of these services, namely service coordination, is a challenging task. Service coordination comprises the placement and scalability of components and scheduling incoming traffic requesting for services between deployed instances. Due to the online nature of the problem and the success of Deep Reinforcement Learning (DRL) methods, previous works considered DRL agents for solving service coordination problems, yet these solutions have to be retrained for every unseen scenario. Other works have tried to tackle this shortcoming by incorporating Graph Neural Networks (GNN) into their solutions, but they often focus on specific aspects (and disregard others) or cannot operate in dynamic and practical situations where there is no labeled dataset and feedback from the network might be delayed. In response to these challenges, we present GSC, a generalizable service coordinator that jointly considers service placement, scaling, and traffic scheduling. GSC can operate in unseen situations without significant performance degradation and outperforms existing state-of-the-art solutions by 40%, as determined by simulating real-world network situations.
△ Less
Submitted 5 November, 2023;
originally announced November 2023.
-
Moving Target Defense based Secured Network Slicing System in the O-RAN Architecture
Authors:
Mojdeh Karbalaee Motalleb,
Chafika Benzaïd,
Tarik Taleb,
Vahid Shah-Mansouri
Abstract:
The open radio access network (O-RAN) architecture's native virtualization and embedded intelligence facilitate RAN slicing and enable comprehensive end-to-end services in post-5G networks. However, any vulnerabilities could harm security. Therefore, artificial intelligence (AI) and machine learning (ML) security threats can even threaten O-RAN benefits. This paper proposes a novel approach to est…
▽ More
The open radio access network (O-RAN) architecture's native virtualization and embedded intelligence facilitate RAN slicing and enable comprehensive end-to-end services in post-5G networks. However, any vulnerabilities could harm security. Therefore, artificial intelligence (AI) and machine learning (ML) security threats can even threaten O-RAN benefits. This paper proposes a novel approach to estimating the optimal number of predefined VNFs for each slice while addressing secure AI/ML methods for dynamic service admission control and power minimization in the O-RAN architecture. We solve this problem on two-time scales using mathematical methods for determining the predefined number of VNFs on a large time scale and the proximal policy optimization (PPO), a Deep Reinforcement Learning algorithm, for solving dynamic service admission control and power minimization for different slices on a small-time scale. To secure the ML system for O-RAN, we implement a moving target defense (MTD) strategy to prevent poisoning attacks by adding uncertainty to the system. Our experimental results show that the proposed PPO-based service admission control approach achieves an admission rate above 80\% and that the MTD strategy effectively strengthens the robustness of the PPO method against adversarial attacks.
△ Less
Submitted 23 September, 2023;
originally announced September 2023.
-
Traffic Offloading Probability for Integrated LEO Satellite-Terrestrial Networks
Authors:
Hossein Akhlaghpasand,
Vahid Shah-Mansouri
Abstract:
In this paper, we consider traffic offloading of integrated low earth orbit (LEO) satellite-terrestrial network. We first derive traffic offloading probability from the terrestrial network to the LEO satellite network based on the instantaneous radio signal strength. Then to overcome limited coverage and also traffic congestion of the terrestrial network, we design an optimal satellite network in…
▽ More
In this paper, we consider traffic offloading of integrated low earth orbit (LEO) satellite-terrestrial network. We first derive traffic offloading probability from the terrestrial network to the LEO satellite network based on the instantaneous radio signal strength. Then to overcome limited coverage and also traffic congestion of the terrestrial network, we design an optimal satellite network in which the minimum number of LEO satellites maximizes the traffic offloading probability, while probability of a generic LEO satellite being idle is close to zero. Since the satellite network is optimized regarding the intensities of the base stations (BSs) and the users, it can control the terrestrial traffic. Numerical results show that an appropriate number of LEO satellites overcomes the limited coverage in a region with low intensity of the BSs and also the traffic congestion by controlling the traffic in a region that the intensity of the users increases.
△ Less
Submitted 31 July, 2023;
originally announced July 2023.
-
Design and Evaluation of Crowd-sourcing Platforms Based on Users Confidence Judgments
Authors:
Samin Nili Ahmadabadi,
Maryam Haghifam,
Vahid Shah-Mansouri,
Sara Ershadmanesh
Abstract:
Crowd-sourcing deals with solving problems by assigning them to a large number of non-experts called crowd using their spare time. In these systems, the final answer to the question is determined by summing up the votes obtained from the community. The popularity of using these systems has increased by facilitation of access to community members through mobile phones and the Internet. One of the i…
▽ More
Crowd-sourcing deals with solving problems by assigning them to a large number of non-experts called crowd using their spare time. In these systems, the final answer to the question is determined by summing up the votes obtained from the community. The popularity of using these systems has increased by facilitation of access to community members through mobile phones and the Internet. One of the issues raised in crowd-sourcing is how to choose people and how to collect answers. Usually, the separation of users is done based on their performance in a pre-test. Designing the pre-test for performance calculation is challenging; The pre-test questions should be chosen in a way that they test the characteristics in people related to the main questions. One of the ways to increase the accuracy of crowd-sourcing systems is to pay attention to people's cognitive characteristics and decision-making model to form a crowd and improve the estimation of the accuracy of their answers to questions. People can estimate the correctness of their responses while making a decision. The accuracy of this estimate is determined by a quantity called metacognition ability. Metacoginition is referred to the case where the confidence level is considered along with the answer to increase the accuracy of the solution. In this paper, by both mathematical and experimental analysis, we would answer the following question: Is it possible to improve the performance of the crowd-sourcing system by knowing the metacognition of individuals and recording and using the users' confidence in their answers?
△ Less
Submitted 2 July, 2024; v1 submitted 12 December, 2022;
originally announced December 2022.
-
Delay Analysis of Base Station Flow Table in SDN-enabled Radio Access Networks
Authors:
Seyed Hamed Rastegar,
Aliazam Abbasfar,
Vahid Shah-Mansouri
Abstract:
Future generation wireless networks are designed with extremely low delay requirements which makes even small contributed delays important. On the other hand, software defined networking (SDN) has been introduced as a key enabler of future wireless and cellular networks in order to make them more flexible. In SDN, a central controller manages all network equipments by setting the match-action pair…
▽ More
Future generation wireless networks are designed with extremely low delay requirements which makes even small contributed delays important. On the other hand, software defined networking (SDN) has been introduced as a key enabler of future wireless and cellular networks in order to make them more flexible. In SDN, a central controller manages all network equipments by setting the match-action pairs in flow tables of the devices. However, these flow tables have limited capacity and thus are not capable of storing the rules of all the users. In this paper, we consider an SDN-enabled base station (SD-BS) in a cell equipped with a limited capacity flow table. We analyze the expected delay incurred in processing of the incoming packets to the SD-BS and present a mathematical expression for it in terms of density of the users and cell area.
△ Less
Submitted 12 June, 2021;
originally announced June 2021.
-
Generative Adversarial Networks (GANs) in Networking: A Comprehensive Survey & Evaluation
Authors:
Hojjat Navidan,
Parisa Fard Moshiri,
Mohammad Nabati,
Reza Shahbazian,
Seyed Ali Ghorashi,
Vahid Shah-Mansouri,
David Windridge
Abstract:
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extensively researched machine learning sub-field for the creation of synthetic data through deep generative modeling. GANs have consequently been applied in a number of domains, most notably computer vision, in which they are typically used to generate or transform synthetic images. Given their relative…
▽ More
Despite the recency of their conception, Generative Adversarial Networks (GANs) constitute an extensively researched machine learning sub-field for the creation of synthetic data through deep generative modeling. GANs have consequently been applied in a number of domains, most notably computer vision, in which they are typically used to generate or transform synthetic images. Given their relative ease of use, it is therefore natural that researchers in the field of networking (which has seen extensive application of deep learning methods) should take an interest in GAN-based approaches. The need for a comprehensive survey of such activity is therefore urgent. In this paper, we demonstrate how this branch of machine learning can benefit multiple aspects of computer and communication networks, including mobile networks, network analysis, internet of things, physical layer, and cybersecurity. In doing so, we shall provide a novel evaluation framework for comparing the performance of different models in non-image applications, applying this to a number of reference network datasets.
△ Less
Submitted 10 May, 2021;
originally announced May 2021.
-
Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks
Authors:
Reza Moosavi,
Saeedeh Parsaeefard,
Mohammad Ali Maddah-Ali,
Vahid Shah-Mansouri,
Babak Hossein Khalaj,
Mehdi Bennis
Abstract:
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during…
▽ More
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks, and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this system model as partial SDN and hybrid NFV MCN which can cover different modes of SDN and NFV implementations. Based on this framework, we formulate energy efficiency by considering joint routing and function placement in the network. Since this problem belongs to the class of non-linear integer programming problems, to solve it efficiently, we present a modified Viterbi algorithm (MVA) based on multi-stage graph modeling and a modified Dijkstra's algorithm. We simulate this algorithm for a number of network scenarios with different fractions of NFV and SDN nodes, and evaluate how much energy can be saved through such transition. Simulation results confirm the expected performance of the algorithm which saves up to 70% energy compared to network where all nodes are always on. Interestingly, the amount of energy saved by the proposed algorithm in the case of hybrid NFV and partial SDN networks can reach up to 60-90% of the saved energy in full NFV/SDN networks.
△ Less
Submitted 17 October, 2020; v1 submitted 26 July, 2020;
originally announced July 2020.
-
Classification of Traffic Using Neural Networks by Rejecting: a Novel Approach in Classifying VPN Traffic
Authors:
Ali Parchekani,
Salar Nouri,
Vahid Shah-Mansouri,
Seyed Pooya Shariatpanahi
Abstract:
In this paper, we introduce a novel end-to-end traffic classification method to distinguish between traffic classes including VPN traffic in three layers of the Open Systems Interconnection (OSI) model. Classification of VPN traffic is not trivial using traditional classification approaches due to its encrypted nature. We utilize two well-known neural networks, namely multi-layer perceptron and re…
▽ More
In this paper, we introduce a novel end-to-end traffic classification method to distinguish between traffic classes including VPN traffic in three layers of the Open Systems Interconnection (OSI) model. Classification of VPN traffic is not trivial using traditional classification approaches due to its encrypted nature. We utilize two well-known neural networks, namely multi-layer perceptron and recurrent neural network to create our cascade neural network focused on two metrics: class scores and distance from the center of the classes. Such approach combines extraction, selection, and classification functionality into a single end-to-end system to systematically learn the non-linear relationship between input and predicted performance. Therefore, we could distinguish VPN traffics from non-VPN traffics by rejecting the unrelated features of the VPN class. Moreover, we obtain the application type of non-VPN traffics at the same time. The approach is evaluated using the general traffic dataset ISCX VPN-nonVPN, and an acquired dataset. The results demonstrate the efficacy of the framework approach for encrypting traffic classification while also achieving extreme accuracy, $95$ percent, which is higher than the accuracy of the state-of-the-art models, and strong generalization capabilities.
△ Less
Submitted 10 December, 2021; v1 submitted 10 January, 2020;
originally announced January 2020.
-
A Dynamic Reliability-Aware Service Placement for Network Function Virtualization (NFV)
Authors:
Mohammad Karimzadeh Farshbafan,
Vahid Shah-Mansouri,
Dusit Niyato
Abstract:
Network softwarization is one of the major paradigm shifts in the next generation of networks. It enables programmable and flexible management and deployment of the network. Network function virtualization (NFV) is referred to the deployment of software functions running on commodity servers instead of traditional hardware-based middle-boxes. It is an example of network softwarization. In NFV, a s…
▽ More
Network softwarization is one of the major paradigm shifts in the next generation of networks. It enables programmable and flexible management and deployment of the network. Network function virtualization (NFV) is referred to the deployment of software functions running on commodity servers instead of traditional hardware-based middle-boxes. It is an example of network softwarization. In NFV, a service is defined as a chain of software functions named service chain function (SFC). The process of allocating the resources of servers to the services, called service placement, is the most challenging mission in NFV. Dynamic nature of the service arrivals and departures as well as meeting the service level agreement make the service placement problem even more challenging. In this paper, we propose a model for dynamic reliability-aware service placement based on the simultaneous allocation of the main and backup servers. Then, we formulate the dynamic reliability-aware service placement as an infinite horizon Markov decision process (MDP), which aims to minimize the placement cost and maximize the number of admitted services. In the proposed MDP, the number of active services in the network is considered to be the state of the system, and the state of the idle resources is estimated based on it. Also, the number of possible admitted services is considered as the action of the presented MDP. To evaluate each possible action in the proposed MDP, we use a sub-optimal method based on the Viterbi algorithm named Viterbi-based Reliable Static Service Placement (VRSSP) algorithm. We determine the optimal policy based on value iteration method using an algorithm named VRSSP-based Value Iteration (VVI) algorithm. Eventually, through the extensive simulations, the superiority of the proposed model for dynamic reliability-aware service placement compared to the static solutions is inferred.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Joint Power Allocation and Network Slicing in an Open RAN System
Authors:
Mojdeh Karbalaee Motalleb,
Vahid Shah-Mansouri,
Salar Nouri Naghadeh
Abstract:
Open radio access network (ORAN) alliance which has been formed recently establishes a flexible, open, and smart radio access network (RAN) by combing the ideas from xRAN and cloud RAN (C-RAN). ORAN divides the functions of the RAN into three parts, namely remote unit (RU), distributed unit (DU), and central unit (CU). While RU contains lower PHY functions, DU contains higher PHY, MAC, and RLC and…
▽ More
Open radio access network (ORAN) alliance which has been formed recently establishes a flexible, open, and smart radio access network (RAN) by combing the ideas from xRAN and cloud RAN (C-RAN). ORAN divides the functions of the RAN into three parts, namely remote unit (RU), distributed unit (DU), and central unit (CU). While RU contains lower PHY functions, DU contains higher PHY, MAC, and RLC and CU contains RRC, PDCP, and SDAP. CU and DU are implemented as virtual network functions (VNFs) running on a cloud environment. Interface between RU, CU, and DU are open standard interfaces. Network slicing as a new concept in 5G systems is used to share the network resources between various services while the operation of one service does not affect another service. In this paper, we study the problem of RAN network slicing in an ORAN system. We formulate the problem of wireless link scheduling, map** the slices to the services, and map** the physical data centers resource to slices. The objective is to jointly maximize the energy efficiency and minimize power consumption of RUs and the cost of physical resources in a downlink channel. The problem is formulated as a mixed-integer optimization problem that can be decomposed into two independent sub-problems. Heuristic algorithms are proposed for each of the sub-problems.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Reactive Failure Mitigation through Seamless Migration in Telecom Infrastructure Networks
Authors:
Mahdi Soleimani,
Vahid Shah-Mansouri
Abstract:
Various methods are proposed in the literature to mitigate the failures in an infrastructure network. Failure mitigation can be carried out in an active or passive manner. In active manner, live backups provide the required reliability. Due to the high cost of active backups, failures can be mitigated in a reactive manner where mitigation starts when a function fails. In this paper, network functi…
▽ More
Various methods are proposed in the literature to mitigate the failures in an infrastructure network. Failure mitigation can be carried out in an active or passive manner. In active manner, live backups provide the required reliability. Due to the high cost of active backups, failures can be mitigated in a reactive manner where mitigation starts when a function fails. In this paper, network functions are divided into two classes of essential (i.e., core) functions and additive (i.e., service) functions. Core functions need active backups and cannot tolerate any failure. However, additive functions do not require backups and their absence is tolerable in short periods. Maximum tolerable (function) absence time (TAT) is a measure used for their reliability level. In our model and within the mitigation process, first, the backup host to migrate the failed function is selected. Then, the state of the function is migrated. The process should be carried out in less than TAT. An optimization problem is formulated investigating cost-effective failure mitigation of additive functions. The problem is of mixed integer non convex form. To tackle the computational complexity, it is bisected into two back-to-back leader-follower parts. The leader selects the migration destinations and the follower divides network resources among functions for migration. These problems are both NP-hard. For the leader problem, a central heuristic based on the Viterbi algorithm suggested. The follower problem is converted into two convex sub-problems. The validity of the proposed algorithms is proved via extensive numerical results.
△ Less
Submitted 4 November, 2019;
originally announced November 2019.
-
Analysis of Distributed ADMM Algorithm for Consensus Optimization in Presence of Node Error
Authors:
Layla Majzoobi,
Farshad Lahouti,
Vahid Shah-Mansouri
Abstract:
Alternating Direction Method of Multipliers (ADMM) is a popular convex optimization algorithm, which can be employed for solving distributed consensus optimization problems. In this setting agents locally estimate the optimal solution of an optimization problem and exchange messages with their neighbors over a connected network. The distributed algorithms are typically exposed to different types o…
▽ More
Alternating Direction Method of Multipliers (ADMM) is a popular convex optimization algorithm, which can be employed for solving distributed consensus optimization problems. In this setting agents locally estimate the optimal solution of an optimization problem and exchange messages with their neighbors over a connected network. The distributed algorithms are typically exposed to different types of errors in practice, e.g., due to quantization or communication noise or loss. We here focus on analyzing the convergence of distributed ADMM for consensus optimization in presence of additive random node error, in which case, the nodes communicate a noisy version of their latest estimate of the solution to their neighbors in each iteration. We present analytical upper and lower bounds on the mean squared steady state error of the algorithm in case that the local objective functions are strongly convex and have Lipschitz continuous gradients. In addition we show that, when the local objective functions are convex and the additive node error is bounded, the estimation error of the noisy ADMM for consensus optimization is also bounded. Numerical results are provided which demonstrate the effectiveness of the presented analyses and shed light on the role of the system and network parameters on performance.
△ Less
Submitted 8 January, 2019;
originally announced January 2019.
-
Deep Q-Learning for Dynamic Reliability Aware NFV-Based Service Provisioning
Authors:
Hamed Rahmani Khezri,
Puria Azadi Moghadam,
Mohammad Karimzadeh Farshbafan,
Vahid Shah-Mansouri,
Hamed Kebriaei,
Dusit Niyato
Abstract:
Network function virtualization (NFV) is referred to the technology in which softwarized network functions virtually run on commodity servers. Such functions are called virtual network functions (VNFs). A specific service is composed of a set of VNFs. This is a paradigm shift for service provisioning in telecom networks which introduces new design and implementation challenges. One of these challe…
▽ More
Network function virtualization (NFV) is referred to the technology in which softwarized network functions virtually run on commodity servers. Such functions are called virtual network functions (VNFs). A specific service is composed of a set of VNFs. This is a paradigm shift for service provisioning in telecom networks which introduces new design and implementation challenges. One of these challenges is to meet the reliability requirement of the requested services considering the reliability of the commodity servers. VNF placement which is the problem of assigning commodity servers to the VNFs becomes crucial under such circumstances. To address such an issue, in this paper, we employ Deep Q-Network (DQN) to model NFV placement problem considering the reliability requirement of the services. The output of the introduced model determines what placement will be optimal in each state. Numerical evaluations show that the introduced model can significantly improve the performance of the network operator.
△ Less
Submitted 3 December, 2018;
originally announced December 2018.
-
Game-Theoretic Spectrum Trading in RF Relay-Assisted Free-Space Optical Communications
Authors:
Shenjie Huang,
Vahid Shah-Mansouri,
Majid Safari
Abstract:
This work proposes a novel hybrid RF/FSO system based on a game theoretic spectrum trading process. It is assumed that no RF spectrum is preallocated to the FSO link and only when the link availability is severely impaired by the infrequent adverse weather conditions, i.e. fog, etc., the source can borrow a portion of licensed RF spectrum from one of the surrounding RF nodes. Using the leased spec…
▽ More
This work proposes a novel hybrid RF/FSO system based on a game theoretic spectrum trading process. It is assumed that no RF spectrum is preallocated to the FSO link and only when the link availability is severely impaired by the infrequent adverse weather conditions, i.e. fog, etc., the source can borrow a portion of licensed RF spectrum from one of the surrounding RF nodes. Using the leased spectrum, the source establishes a dual-hop RF/FSO hybrid link to maintain its throughout to the destination. The proposed system is considered to be both spectrum- and power-efficient. A market-equilibrium-based pricing process is proposed for the spectrum trading between the source and RF nodes. Through extensive performance analysis, it is demonstrated that the proposed scheme can significantly improve the average capacity of the system, especially when the surrounding RF nodes are with low traffic loads. In addition, the system benefits from involving more RF nodes into the spectrum trading process by means of diversity, particularly when the surrounding RF nodes have high probability of being in heavy traffic loads. Furthermore, the application of the proposed system in a realistic scenario is presented based on the weather statistics in the city of Edinburgh, UK. It is demonstrated that the proposed system can substantially enhance the link availability towards the carrier-class requirement.
△ Less
Submitted 27 June, 2018;
originally announced June 2018.
-
Joint Throughput Maximization and Power Control in Poisson CoopMAC Networks
Authors:
Masoumeh Sadeghi,
Homa Nikbakht,
Amir Masoud Rabiei,
Vahid Shah-Mansouri
Abstract:
A cooperative medium access control (CoopMAC) network with randomly distributed helpers is considered. We introduce a new helper selection scheme which maximizes the average throughput while maintaining a low power consumption profile in the network. To this end, all transmissions are assumed to be performed using power control. We assume that each node can estimate the channel between itself and…
▽ More
A cooperative medium access control (CoopMAC) network with randomly distributed helpers is considered. We introduce a new helper selection scheme which maximizes the average throughput while maintaining a low power consumption profile in the network. To this end, all transmissions are assumed to be performed using power control. We assume that each node can estimate the channel between itself and a receiving node. Then, it evaluates the minimum transmission power needed to achieve the desired signal to noise ratio (SNR). If the required transmission power is less than the maximum transmission power of the node, the communication is regarded as successful. Otherwise, the transmission is canceled. %Also, we classify the helpers into six groups according to their transmission rates IEEE 802.11b Standard. In order to increase the average throughput, we assume that the cooperative link with the highest transmission rate is chosen from those that can successfully forward the source signal to destination. Also, when there are several links with the same rates, the one with minimum required power is given the highest priority. Assuming that the helpers are distributed as a Poisson point process with fixed intensity, we derive exact expressions for the average throughput and the power consumption of the network. Simulation results show that our scheme is able to significantly increase the throughput in comparison to the conventional CoopMAC network. It is also able to reduce the power consumption compared to a network with no power control approach.
△ Less
Submitted 13 December, 2016; v1 submitted 25 November, 2016;
originally announced November 2016.
-
Exact Throughput Analysis of Random CoopMAC Networks in the Presence of Shadowing
Authors:
Homa Nikbakht,
Amir Masoud Rabiei,
Vahid Shah-Mansouri
Abstract:
The throughput performance of a random cooperative medium access control (CoopMAC) network in the presence of shadowing is considered. The nodes are assumed to be randomly distributed according to a homogeneous two-dimensional Poisson point process with constant intensity. The conditions under which a helper can improve the transmission rate between a given pair of nodes are examined. Based on the…
▽ More
The throughput performance of a random cooperative medium access control (CoopMAC) network in the presence of shadowing is considered. The nodes are assumed to be randomly distributed according to a homogeneous two-dimensional Poisson point process with constant intensity. The conditions under which a helper can improve the transmission rate between a given pair of nodes are examined. Based on these conditions, an exact analytical expression is derived for the average cooperative throughput of a random CoopMAC network that is subject to path loss and shadowing. This expression is then used to investigate the effects of shadowing, intensity of nodes and the distance between source and destination nodes on the cooperative throughput of the network. It is observed that the average cooperative throughput of the network increases only slightly when the intensity of helpers increases beyond a certain value.
△ Less
Submitted 17 December, 2016; v1 submitted 10 November, 2016;
originally announced November 2016.
-
A New Approach for Helper Selection and Performance Analysis in Poisson CoopMAC Networks
Authors:
Homa Nikbakht,
Amir Masoud Rabiei,
Vahid Shah-Mansouri
Abstract:
The cooperative medium access control (CoopMAC) protocol in the presence of randomly-distributed nodes and shadowing is considered. The nodes are assumed to be distributed according to a homogeneous two-dimensional Poisson point process. A new approach is proposed for helper selection and throughput performance analysis which depends on the shadowing parameters as well as the distribution of helpe…
▽ More
The cooperative medium access control (CoopMAC) protocol in the presence of randomly-distributed nodes and shadowing is considered. The nodes are assumed to be distributed according to a homogeneous two-dimensional Poisson point process. A new approach is proposed for helper selection and throughput performance analysis which depends on the shadowing parameters as well as the distribution of helpers. In the proposed protocol, the potential helpers are divided into several tiers based on their distances from the source and destination in a way that the lower the tier index, the higher its priority. When there are several helpers of the same tier, the helper that is less affected by shadowing is chosen for cooperation. Upper and lower bounds are derived for the average cooperative throughput of the proposed CoopMAC protocol. It is observed that the proposed scheme readily outperforms the conventional CoopMAC protocol in having larger average throughput. It is also seen that the cooperative throughput of the proposed scheme approaches the upper bound when the density of nodes increases.
△ Less
Submitted 4 October, 2016;
originally announced October 2016.