[期刊论文][Full-length article]


One-shot models for local core network placement and traffic optimization in self deployable networks

作   者:
Asma Bechkit;Ali Melit;

出版年:2023

页    码:103721 - 103721
出版社:Elsevier BV


摘   要:

In recent years, we have witnessed a proliferation of core network (CN) virtualization, coupled with the emergence of self deployable architectures in cellular networks . These advances provide greater flexibility and allow CN functions to be virtualized and co-located with one or more base stations . However, they introduce new challenges, such as the optimal location of CN functions based on the physical architecture. In this paper, we tackle this problem and propose a new generic and efficient solution that locates the best base station to host the CN functions, while optimizing a given performance metric (e.g., maximum flow, max–min fairness, etc.) The core of our solution relies on jointly modeling the problem as a Mixed-Integer Nonlinear Programming (MINLP) and efficiently linearizing the nonlinear constraints. After presenting our model, we evaluate its performances, considering the global maximum flow as an optimization metric. The results showed that our joint modeling significantly reduces the run time compared to existing solutions while achieving the same optimal results. Furthermore, we highlight the genericity of our model, and we show how it can be easily adapted to handle different optimization metrics. We particularly consider some variants to address the fairness problem in conjunction with the local CN placement issue. We perform extensive simulations and discuss the obtained results. The latter allow us to derive insights regarding the tradeoff between maximum flow and fairness of proportional satisfaction, while highlighting the strengths of the proposed joint modeling. Introduction The field of cellular networks has been undergoing major developments in recent years. On the one hand, the democratization of mobile systems like robots and Unmanned Aerial Vehicles (UAVs) offers the possibility to embed base stations (Mozaffari et al., 2019, Chandrasekharan et al., 2016, Lin et al., 2018, Huang et al., 2019) or even the core network (Sundaresan et al., 2018, Moradi et al., 2018, Moradi et al., 2019, Moradi et al., 2020) on these mobile units. On the other hand, the field of cellular networks witnesses an increasing proliferation of Network Function Virtualization (NFV) and Software Defined Networking (SDN) which offer more flexibility in core network (Nguyen et al., 2017, Bagaa et al., 2018, Zhang et al., 2021). These two facts coupled with the self-organization capabilities offered by recent standards like 5G including self-configuration, self-optimization and self-healing gave birth to the self deployable cellular network concept allowing more flexible and timely deployment of cellular networks (Fourati et al., 2021, Oueis et al., 2019, Oueis, 2018). This concept is even more timely and challenging given the emergence of private networks (Sarver, 2022) and the place that drones take in the future 6G standardization (Mishra et al., 2021). Even though the concept of self deployable cellular network can be applicable and useful in different situations like coverage extension and management of crowded events, one of the main applications still is the communication rehabilitation in emergencies (Oueis, 2018, Selim and Kamal, 2018, Gomez et al., 2014). Indeed, in these situations that usually follow a natural or human made disaster, the traditional networks are partially or completely non-operational. Self deployable networks may offer here a key solution in order to easily and rapidly recover the communications between humans and first responders (Oueis, 2018). In self deployable networks, bases stations are deployed quickly and easily. They may be connected to a traditional network for coverage extension for instance or deployed standalone to be used separately in an autonomous way. We focus, in our work, on this kind of deployment where we have no backhaul to a traditional network and where all the functionalities of the core network may be grouped and co-located with one or more base stations of the network. A key point brought by self deployable networks is the continuum between radio access networks and core network. Indeed, the virtualized core network functions can be directly hosted in a base station forming local CN (Zhang et al., 2021). These functions may be hosted at each base station like considered in Moradi et al., 2018, Moradi et al., 2019, Moradi et al., 2020 or in one base station that hosts a shared local CN like considered in Zhang et al. (2021) and Oueis et al. (2019). In this work, we consider this second case, where all functionalities of the core network are grouped in one unit (named local CN) that will be co-located with one base station of the network. Although the benefits of self deployable networks and the continuum between radio access network and core network, these advances bring new scientific challenges. One of these multiple challenges concerns the optimal placement of shared local CN. Indeed, the choice of the base station that will host the local CN should be computed in a reasonable time in order to meet the need for reactivity. Also, this choice should be done rigorously, while considering different objectives like the overall throughput, the fairness, etc. We tackle this issue in this paper while considering the problem of efficient local CN placement. We propose for that a new one-shot generic model that allows to simultaneously locate the local CN while optimizing a given performance metric. The main contributions of this work can be summarized in the following points: • We design a Mixed Integer Non-Linear Program that allows to find in one shot the best optimal local CN while maximizing a performance metric. We linearize the constraints and discuss the resulting linear model. • We validate our model while comparing it to two existing ones based on an iterative modeling. We discuss the results that show that our model reduces significantly the run time while giving the same optimal solutions. • We show that our new one-shot model is generic and can be easily adapted to address different optimization metrics. In particular, we consider some fairness metrics and conduct extensive simulations to evaluate the performances of the resulting models and to derive some insights. We also evaluate the run time according to the optimization metrics. The rest of this paper is organized as follows. Section 2 discusses some representative related work. In Section 3, we present the problem formulation as well as the main notations. Section 4 focuses on the design and linearization of our one-shot model, while we discuss the performance evaluation and the comparison results in Section 5. In Section 6, we address the genericity of our model while presenting and discussing some fairness-aware variants. We discuss in Section 7 the evaluation of these variants in terms of the addressed metrics as well as the run time. We finally present some conclusions and future work in Section 8. Section snippets Related work Self deployable cellular networks have attracted much attention in recent years thanks to their benefits. Indeed, on the one hand, they facilitate the deployment in the situations where we have no connection to the traditional network. On the other hand, they allow increasing the coverage in some areas in critical situations (crowded area, rural area, etc.) While some researchers focus on the development and deployment of self deployable cellular networks (Sundaresan et al., 2018, Moradi et Notations and problem statement In this section, we present the formulation of our problem. We also discuss some assumptions and the notations that we use in the rest of the paper. Similarly to related work, we model the self deployable network as a weighted directed graph G(V, E) where V, the set of vertices, represents the base stations (BSs) and E, the set of arcs, models the communication links. In order to model the communication limited bandwidth, we suppose that each edge ( i , j ) ∈ E in the graph has a limited capacity Our one-shot model for local CN location and flow maximization One contribution of this work is to propose a new one-shot model that, unlike the model proposed in Oueis et al. (2019), optimizes at the same time the CN best location as well as the flow values. For that end, we use Mixed Integer Programming, and we define the binary decision variables, y i , which are equal to 1 if the BS (node) i should be selected as the best one to host the local CN and zero otherwise. Without loss of generality, we assume that we try to locate the CN at only one base Model validation and performance evaluation In order to validate our model and to highlight its features and benefits, we conduct extensive simulations while comparing our solutions to two existing ones. We present in this section the different simulation scenarios, and we discuss some main results. Fairness-aware models In the previous sections, we have proposed a one-shot model that allows at the same time finding the best BS to host the local CN as well as maximizing the total flow in the network. The metric of maximizing the total flow is widely used in the literature in multiple applications, but may lead to inequitable sharing between the flow of the different base stations both regarding BS supplies and regarding the proportional satisfaction unfairness between BSs. The fairness in traffic engineering Evaluation of proportional satisfaction fairness-aware models We implement the three additional models, following the same simulation setup presented in Section 5.1. We then compare the four models based on the four optimization metrics as well as the run time. The results are plotted in Fig. 4, Fig. 5. Conclusions and future work In this paper, we consider the problem of local Core Network (CN) placement and traffic optimization in self deployable networks. We first jointly model the problem as a Mixed Integer Non-Linear Program that allows to find at the same time the best location of the local CN, and maximizing the overall flow in the network. We linearize the constraints of our initial model and compare it to other solutions from the literature. The results are presented and discussed for both homogeneous and CRediT authorship contribution statement Asma Bechkit: Conceptualization, Methodology, Software, Validation, Formal analysis, Writing – original draft, Writing – review & editing. Ali Melit: Supervision, Project administration, Conceptualization, Methodology, Validation, Writing – review & editing. Declaration of competing interest The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper. Asma Bechkit is currently Ph.D. student in the department of Computer Science of the University of Jijel — Algeria. She received her Master degree in Networks and Security in 2016 and her Bachelor degree in 2014 from the same university. She also serves as teaching assistant at the University of Jijel since 2022. References (35) Bozkaya Elif et al. SDN-enabled deployment and path planning of aerial base stations Comput. Netw. (2020) Demirci Sedef et al. Optimal placement of virtual network functions in software defined networks: A survey J. Netw. Comput. Appl. (2019) Fourati Hasna et al. Comprehensive survey on self-organizing cellular network approaches applied to 5G networks Comput. Netw. (2021) Golkarifard Morteza et al. Dynamic VNF placement, resource allocation and traffic routing in 5G Comput. Netw. (2021) Huang Hailong et al. Optimized deployment of drone base station to improve user experience in cellular networks J. Netw. Comput. Appl. (2019) Oueis Jad et al. Core network function placement in self-deployable mobile networks Comput. Commun. (2019) Sun Jie et al. A survey on the placement of virtual network functions J. Netw. Comput. Appl. (2022) Wahab Omar Abdel et al. MAPLE: A machine learning approach for efficient placement and adjustment of virtual network functions J. Netw. Comput. Appl. (2019) Amaldi Edoardo et al. Network optimization problems subject to max-min fair flow allocation IEEE Commun. Lett. (2013) Aoun B. et al. Gateway placement optimization in wireless mesh networks with QoS constraints IEEE J. Sel. Areas Commun. (2006) Bagaa Miloud et al. Coalitional game for the creation of efficient virtual core network slices in 5G mobile systems IEEE J. Sel. Areas Commun. (2018) Chandrasekharan Sathyanarayanan et al. Designing and implementing future aerial communication networks IEEE Commun. Mag. (2016) Danna, Emilie, Hassidim, Avinatan, Kaplan, Haim, Kumar, Alok, Mansour, Yishay, Raz, Danny, Segalov, Michal, 2012a.... Danna, Emilie, Mandal, Subhasree, Singh, Arjun, 2012b. A practical algorithm for balancing the max-min fairness and... Das, Debasree, Rehena, Zeenat, Roy, Sarbani, Mukherjee, Nandini, 2013. Multiple-sink placement strategies in wireless... Gomez Karina et al. Enabling disaster-resilient 4G mobile communication networks IEEE Commun. Mag. (2014) Karnik Aditya et al. Throughput-optimal configuration of fixed wireless networks IEEE/ACM Trans. Netw. (2008) View more references Cited by (0) Recommended articles (6) Research article TTAF: A two-tier task assignment framework for cooperative unit-based crowdsourcing systems Journal of Network and Computer Applications, Volume 218, 2023, Article 103719 Show abstract Traditional task assignment follows a direct recruitment model in which requesters recruit and select workers to complete tasks. Because of the unclear division of roles and the diversity of each role’s mission, this model is neither efficient nor scalable. This paper introduces the concept of cooperative unit (CU), in which workers are organized into cooperative units, whose proxies bid for tasks from requesters based on worker characteristics. However, because of the decentralization of task assignment, quality control is complicated, and the benefits of different roles must be balanced. As a result, we propose a novel two-tier task assignment framework (TTAF) that produces high-quality results while striking the appropriate balance between requesters, CUs, and workers. We first propose a vector-based expertise representation model that evaluates workers’ expertise based on previous answers. Then, we devise a higher-tier task assignment between tasks and CUs that maximizes answer quality while staying within budget. The quality of the answers is ensured by aspects such as keyword coverage, overall expertise, and the number of workers. We also devise lower-tier task assignment, which evenly distributes tasks among workers such that more workers have the opportunity to perform tasks. The extensive evaluation shows that our proposed approaches achieve promising results. Research article Bandwidth abstraction with the end-to-end latency-bounded reliability provisioning based on martingale theory Computer Communications, Volume 210, 2023, pp. 79-89 Show abstract The provisioning of reliability regard to end-to-end (E2E) latency is crux for Ultra-Reliable Low Latency Communications (URLLCs). Based on martingale theory and stochastic network calculus, an E2E latency-bounded reliability analysis framework is proposed for the multi-hop system, where the arrival traffic possesses burstiness and the services provided by nodes are heterogeneous. The Wald martingales of arrival and service processes are constructed respectively, which contribute to reveal the influence of multiple random processes entangled with each other on the E2E latency. Leveraging the Doob maximum inequality of martingales and the features of moment generation functions, a tight upper bound of the unreliability regard to E2E latency is captured. A martingale parameter, named as tandem service descriptor, is proposed to embody the features of the tandem service mode provided for the specifically bursty traffic. The bandwidth abstraction algorithm is designed, which decouples the E2E latency-bounded reliability requirement as the demanded bandwidth of each node. An instantiation scheme of service rates is proposed to conduct the dynamical transmission power allocation according to the access states and channel characteristics in the wireless access network. Research article Robust COVID-19 vaccination control in a multi-city dynamic transmission network: A novel reinforcement learning-based approach Journal of Network and Computer Applications, Volume 219, 2023, Article 103715 Show abstract Vaccines are a highly effective intervention in mitigating the COVID-19 pandemic, but with limited resources, an optimal vaccine allocation plan is essential for reducing the number of infections. However, most previous studies on vaccine allocation strategies have neglected the fact that the real-world virus transmission environment is a network structure with dynamically changing flows between cities. To address this, we propose a Multi-City Network Vaccination Model that incorporates a stochastic daily multi-city virus transmission network to simulate a more realistic vaccination environment. We also present a novel reinforcement learning approach based on Proximal Policy Optimization (PPO) to allocate vaccines in our Multi-City Network Vaccination Model. Our PPO-based dynamic vaccine allocation approach reduces peak infections by 8% and is more robust than two other heuristic approaches. Our framework provides a valuable tool for regional and national authorities to make better public health decisions during a pandemic. Research article A systematic review of federated learning: Challenges, aggregation methods, and development tools Journal of Network and Computer Applications, 2023, Article 103714 Show abstract Since its inception in 2016, federated learning has evolved into a highly promising decentral-ized machine learning approach, facilitating collaborative model training across numerous devices while ensuring data privacy. This survey paper offers an exhaustive and systematic review of federated learning, emphasizing its categories, challenges, aggregation techniques, and associated development tools. To commence, we outline our research strategy used for this survey and evaluate other existing reviews related to federated learning. We initiate the discussion, about federated learning concepts, with a detailed examination of the pri-mary challenges inherent in federated learning, including communication overhead, device and data heterogeneity, and data privacy issues. Subsequently, we scrutinize and classify various aggregation techniques designed to mitigate these challenges, such as federated av-eraging, secure aggregation, and strategies leveraging clustering and optimization method-ologies. Furthermore, we delve into the exploration of cutting-edge development tools and frameworks that expedite efficient implementations of federated learning. Through our review, we aspire to provide a holistic understanding of the federated learning landscape, thereby setting the stage for future investigations, advancements, and practical implemen-tations in this prosperous field. Research article Fine-grained access control policy in blockchain-enabled edge computing Journal of Network and Computer Applications, 2023, Article 103706 Show abstract In the process of data sharing and interaction between untrusted intelligence edge devices, there are risks of misuse and tampering with the data. Hence, how to ensure data security and prevent unauthorized data access is the key problem to be solved in the cloud edge collaborative architecture. However, due to the heterogeneity of edge devices and the diversity of data sources, traditional access control methods cannot meet the requirements of the large-scale, distributed, dynamic and flexible expansion of edge intelligence applications. Therefore, this paper studies the fine-grained data access control method on the basis of smart contracts, and implements the attribute-based access control (ABAC) model through smart contracts. To improve the query efficiency of attributes and policies in the process of access request decision, an attribute management scheme is designed on the basis of the Bloom filter to achieve fast retrieval of attributes and policies. The decentralized fine-grained access control method is tested under the performance indicators such as retrieval delay, deployment delay, rule reduction rate and decision response time. Research article Modular zk-rollup on-demand Journal of Network and Computer Applications, Volume 217, 2023, Article 103678 Show abstract The rapid expansion of the use of blockchain-based systems often leads to a choice between customizable private blockchains and more secure, scalable and decentralized but expensive public blockchains. This choice represents the trade-off between privacy and customization at a low cost and security, scalability, and a large user base but at a high cost. In order to improve the scalability of secure public blockchains while enabling privacy and cost reduction, zk-rollups, a layer 2 solution, appear to be a promising avenue. This paper explores the benefits of zk-rollups, including improved privacy, as well as their potential to support transactions designed for specific applications. We propose an innovative design that allows multiple zk-rollups to co-exist on the same smart contracts, simplifying their creation and customization. We then evaluate the first implementation of our system highlighting a low overhead on existing transaction types and on proof generation while strongly decreasing the cost of new transaction types and drastically reducing zk-rollup creation costs. Asma Bechkit is currently Ph.D. student in the department of Computer Science of the University of Jijel — Algeria. She received her Master degree in Networks and Security in 2016 and her Bachelor degree in 2014 from the same university. She also serves as teaching assistant at the University of Jijel since 2022. Ali Melit is currently full professor in the department of Computer Science of the University of Jijel — Algeria. He received his Engineering degree in 1981 from USTHB University in Algiers and his Ph.D. in Computer Science in 1991 from the University of Pierre and Marie curie, Paris 6 – French. His research areas include: computer systems modeling and performance, queuing theory, optimization and simulation, wireless networks and biometrics. View full text © 2023 Elsevier Ltd. All rights reserved. About ScienceDirect Remote access Shopping cart Advertise Contact and support Terms and conditions Privacy policy We use cookies to help provide and enhance our service and tailor content and ads. By continuing you agree to the use of cookies . Copyright © 2023 Elsevier B.V. or its licensors or contributors. ScienceDirect® is a registered trademark of Elsevier B.V. ScienceDirect® is a registered trademark of Elsevier B.V.



关键字:

暂无


所属期刊
Journal of Network and Computer Applications
ISSN: 1084-8045
来自:Elsevier BV