In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its as...In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.展开更多
The traffic explosion and the rising of diverse requirements lead to many challenges for traditional mobile network architecture on flexibility, scalability, and deployability. To meet new requirements in the 5 G era,...The traffic explosion and the rising of diverse requirements lead to many challenges for traditional mobile network architecture on flexibility, scalability, and deployability. To meet new requirements in the 5 G era, service based architecture is introduced into mobile networks. The monolithic network elements(e.g., MME, PGW, etc.) are split into smaller network functions to provide customized services. However, the management and deployment of network functions in service based 5 G core network are still big challenges. In this paper, we propose a novel management architecture for 5 G service based core network based on NFV and SDN. Combined with SDN, NFV and edge computing, the proposed framework can provide distributed and on-demand deployment of network functions, service guaranteed network slicing, flexible orchestration of network functions and optimal workload allocation. Simulations are conducted to show that the proposed framework and algorithm are effective in terms of reducing network operating cost.展开更多
Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic cha...Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic characteristics from specific perspectives,such as user behaviour,device type,and applications.In this paper,we present the results of our study from a different perspective,namely service providers,to reveal the traffic characteristics of cellular data networks.Our study is based on traffic data collected over a five-day period from a leading mobile operator's core network in China.We propose a Zipf-like model to characterise the distributions of the traffic volume,subscribers,and requests among service providers.Nine distinct diurnal traffic patterns of service providers are identified by formulating and solving a time series clustering problem.Our work differs from previous related works in that we perform measurements on a large quantity of data covering 2.2 billion traffic records,and we first explore the traffic patterns of thousands of service providers.Results of our study present mobile Internet participants with a better understanding of the traffic and usage characteristics of service providers,which play a critical role in the mobile Internet era.展开更多
In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refe...In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refers to detecting whether two moving objects are close to each other or not in real time. However, the battery life and computing capability of mobile devices are limited in the actual scene,which results in high latency and energy consumption. Therefore, it is a tough problem to determine the proximity relationship between mobile users with low latency and energy consumption. In this article, we aim at finding a tradeoff between latency and energy consumption. We formalize the computation offloading problem base on mobile edge computing(MEC)into a constrained multiobjective optimization problem(CMOP) and utilize NSGA-II to solve it. The simulation results demonstrate that NSGA-II can find the Pareto set, which reduces the latency and energy consumption effectively. In addition, a large number of solutions provided by the Pareto set give us more choices of the offloading decision according to the actual situation.展开更多
Applying network duality and elastic mechanics, we investigate the interactions among Internet flows by con- structing a weighted undirected network, where the vertices and the edges represent the flows and the mutual...Applying network duality and elastic mechanics, we investigate the interactions among Internet flows by con- structing a weighted undirected network, where the vertices and the edges represent the flows and the mutual dependence between flows, respectively. Based on the obtained flow interaction network, we find the existence of 'super flow' in the Internet, indicating that some flows have a great impact on a huge number of other flows; moreover, one flow can spread its influence to another through a limited quantity of flows (less than 5 in the experimental simulations), which shows strong small-world characteristics like the social network. To reflect the flow interactions in the physical network congestion evaluation, the 'congestion coefficient' is proposed as a new metric which shows a finer observation on congestion than the eonventional one.展开更多
Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS em...Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million i Phone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of Xcode Ghost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most Xcode Ghost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.展开更多
Understanding the characteristics and predicting the popularity of the newly published online videos can provide direct implications in various contexts such as service design, advertisement planning, network manageme...Understanding the characteristics and predicting the popularity of the newly published online videos can provide direct implications in various contexts such as service design, advertisement planning, network management and etc. In this paper, we collect a real-world large-scale dataset from a leading online video service provider in China, namely Youku. We first analyze the dynamics of content publication and content popularity for the online video service. Then, we propose a rich set of features and exploit various effective classification methods to estimate the future popularity level of an individual video in various scenarios. We show that the future popularity level of a video can be predicted even before the video's release, and by introducing the historical popularity information the prediction performance can be improved dramatically. In addition, we investigate the importance of each feature group and each feature in the popularity prediction, and further reveal the factors that may impact the video popularity. We also discuss how the early monitoring period influences the popularity level prediction. Our work provides an insight into the popularity of the newly published online videos, and demonstrates promising practical applications for content publishers,service providers, online advisers and network operators.展开更多
The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resourc...The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resources(ONER)for EC over Fiber-Wireless(FiWi)access networks is proposed in this paper.In the ONER scheme,the FiWi network connects edge computing nodes with fiber and converges wireless and fiber connections seamlessly,so that it can support the offloading transmission with low delay and wide bandwidth.Based on the ONER scheme supported by FiWi networks,computation tasks can be offloaded to edge computing nodes in a wider range of area without increasing wireless hops(e.g.,just one wireless hop),which achieves low delay.Additionally,an efficient Computation Resource Scheduling(CRS)algorithm based on the ONER scheme is also proposed to make offloading decision.The results show that more offloading requests can be satisfied and the average completion time of computation tasks decreases significantly with the ONER scheme and the CRS algorithm.Therefore,the ONER scheme and the CRS algorithm can schedule computation resources at neighboring edge computing nodes for offloading to meet the challenge of large scale computation tasks.展开更多
The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this pape...The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.展开更多
Wo T(Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers' job easier,it faces security,management and efficiency challenges. We propos...Wo T(Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers' job easier,it faces security,management and efficiency challenges. We propose Wo T/SDN,the architecture of resource oriented Wo T built on SDN(Software Defined Network),in which applications could be developed through resource subscription and Mashup with the programmability provided by SDN. The key components are designed,including Security and Management Controller(SMC),various atomic services and resource subscription syntax. Three applications covering device management,data access and security protection are demonstrated. Compared to traditional resource-oriented Wo T systems,our test results show that SDN,with its logically centralized control capability and awareness of flow forwarding,provides new opportunity to improve performance,simplify management and enhance security for Wo T.展开更多
Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication am...Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication among CUs,an efficient scheme for link maintenance in OFDM-based cognitive radio Ad Hoc networks is proposed in this paper.In the scheme,redundant sub-channels(RSC) are employed by CUs to tackle the outage problem caused by the PUs' reclaim of the spectrum and wireless fading effect in the transmission.Meanwhile,backup sub-channels(BSC) are arranged to help select sub-channels with better channel quality.Additionally,to lower the overhead and improve the accuracy of the spectrum sensing,a partial sensing module is designed to enable the CUs to inherit and update the original idle spectrum list until it expires.Simulation results show that the proposed scheme can realize higher throughput and lower sensing overhead with slight reduction of the forced termination probability(FTP) performance compared to the existing approaches.展开更多
Previous Virtual Network (VN) embedding researches mostly focus on developing heuristic algorithms to enhance the efficiency of a physical resource. However, in the equal-scale condition, where the scale of a VN is si...Previous Virtual Network (VN) embedding researches mostly focus on developing heuristic algorithms to enhance the efficiency of a physical resource. However, in the equal-scale condition, where the scale of a VN is similar to that of a substrate network, the number of successfully mapped VNs decreases sharply since bottlenecks form easily in the substrate network and disturb the embedding process. In this paper, reversed and bidirectional irrigation methods are proposed for the equal-scale and all-scale conditions. The two proposed methods can be combined with most of the existing heuristic algorithms and map a relatively large number of VNs by reducing the potential substrate bottlenecks. The simulation results show that the reversed irrigation method almost doubles the successfully mapped Revenue than the traditional one in the equal-scale condition. Meanwhile, the bidirectional irrigation method achieves the synthetically best performance in almost all scale conditions.展开更多
Millimeter wave(mmWave)massive multiple-input multiple-output(MIMO)plays an important role in the fifth-generation(5G)mobile communications and beyond wireless communication systems owing to its potential of high capa...Millimeter wave(mmWave)massive multiple-input multiple-output(MIMO)plays an important role in the fifth-generation(5G)mobile communications and beyond wireless communication systems owing to its potential of high capacity.However,channel estimation has become very challenging due to the use of massive MIMO antenna array.Fortunately,the mmWave channel has strong sparsity in the spatial angle domain,and the compressed sensing technology can be used to convert the original channel matrix into the sparse matrix of discrete angle grid.Thus the high-dimensional channel matrix estimation is transformed into a sparse recovery problem with greatly reduced computational complexity.However,the path angle in the actual scene appears randomly and is unlikely to be completely located on the quantization angle grid,thus leading to the problem of power leakage.Moreover,multiple paths with the random distribution of angles will bring about serious interpath interference and further deteriorate the performance of channel estimation.To address these off-grid issues,we propose a parallel interference cancellation assisted multi-grid matching pursuit(PIC-MGMP)algorithm in this paper.The proposed algorithm consists of three stages,including coarse estimation,refined estimation,and inter-path cyclic iterative inter-ference cancellation.More specifically,the angular resolution can be improved by locally refining the grid to reduce power leakage,while the inter-path interference is eliminated by parallel interference cancellation(PIC),and the two together improve the estimation accuracy.Simulation results show that compared with the traditional orthogonal matching pursuit(OMP)algorithm,the normalized mean square error(NMSE)of the proposed algorithm decreases by over 14dB in the case of 2 paths.展开更多
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with...In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.展开更多
The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SD...The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SDN flows,onto a shared substrate network automatically and efficiently.Previous researches mainly focus on developing heuristic algorithms for general topology virtual network.In practice however,the virtual network is usually generated with specific topology for specific purpose.Thus,it is a challenge to optimize the heuristic algorithms with these topology information.In order to deal with this problem,we propose a topology-cognitive algorithm framework,which is composed of a guiding principle for topology algorithm developing and a compound algorithm.The compound algorithm is composed of several subalgorithms,which are optimized for specific topologies.We develop star,tree,and ring topology algorithms as examples,other subalgorithms can be easily achieved following the same framework.The simulation results show that the topology-cognitive algorithm framework is effective in developing new topology algorithms,and the developed compound algorithm greatly enhances the performance of the Revenue/Cost(R/C) ratio and the Runtime than traditional heuristic algorithms for multi-topology virtual network embedding problem.展开更多
Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic ...Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources.展开更多
The rapid development of mobile network brings opportunities for researchers to analyze user behaviors based on largescale network traffic data. It is important for Internet Service Providers(ISP) to optimize resource...The rapid development of mobile network brings opportunities for researchers to analyze user behaviors based on largescale network traffic data. It is important for Internet Service Providers(ISP) to optimize resource allocation and provide customized services to users. The first step of analyzing user behaviors is to extract information of user actions from HTTP traffic data by multi-pattern URL matching. However, the efficiency is a huge problem when performing this work on massive network traffic data. To solve this problem, we propose a novel and accurate algorithm named Multi-Pattern Parallel Matching(MPPM) that takes advantage of HashMap in data searching for extracting user behaviors from big network data more effectively. Extensive experiments based on real-world traffic data prove the ability of MPPM algorithm to deal with massive HTTP traffic with better performance on accuracy, concurrency and efficiency. We expect the proposed algorithm and it parallelized implementation would be a solid base to build a high-performance analysis engine of user behavior based on massive HTTP traffic data processing.展开更多
In order to reduce the interference,a novel,cluster-based medium access control(MAC)protocol with load aware for VANETs is proposed in this paper.First,all vehicles on roads are grouped into stable clusters in the lig...In order to reduce the interference,a novel,cluster-based medium access control(MAC)protocol with load aware for VANETs is proposed in this paper.First,all vehicles on roads are grouped into stable clusters in the light of their direction,number of neighbors,link reliability,and traffic load.By utilizing the advantages of centralized control in software defined VANETs(SDVN),cluster stability can be maintained in real-time.Second,a contention-free MAC mechanism composed of inter-cluster multi-channel allocation and intra-cluster dynamic TDMA frame allocation is proposed to prevent co-channel interference and hidden terminal interference.Simulation results show that the proposed protocol outperforms some existing protocols in cluster stability,delivery ratio,throughput and delay performance.展开更多
Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this pa...Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multihop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and doublestring networks, respectively.展开更多
In orthogonal frequency division multiple access(OFDMA) based femtocell networks,the co-tier interference among femto base stations(FBS) becomes important in multiuser and densely deployed environment.In order to miti...In orthogonal frequency division multiple access(OFDMA) based femtocell networks,the co-tier interference among femto base stations(FBS) becomes important in multiuser and densely deployed environment.In order to mitigate the co-tier interference and enhance the system total throughput,this paper proposed a best effort spectrum allocation scheme based on the extension of graph theory.In the scheme,a controller was proposed to collect the channel state information(CSI)of all femtocell user equipments(FUEs) in a certain range.Then,the controller evaluated the signal-to-interference Ratio(SIR) of each FUE and determined the set of its interference neighbors.By calculating the received power matrix(RPM) among FUEs and building interference graph matrix(IGM),different spectrum resource blocks(RBs) were assigned to the users with interference relation,while users without interference relation shared the same RBs,which could increase the spectrum efficiency.Simulation results show that the proposed algorithm can significantly improve the RB usage efficiency compared with the basic graph coloring theory,and more than 80% improvement can be acquired in dense deployment scenario.Besides,the throughput of both cell edge macro user equipments(MUEs) and cell edge FUEs is guaranteed on the premise of low interference.展开更多
基金supported by Beijing Natural Science Fund–Haidian Original Innovation Joint Fund(L232040 and L232045).
文摘In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.
基金supported by China Ministry of Education-CMCC Research Fund Project No.MCM20160104National Science and Technology Major Project No.No.2018ZX03001016+1 种基金Beijing Municipal Science and technology Commission Research Fund Project No.Z171100005217001Fundamental Research Funds for Central Universities NO.2018RC06
文摘The traffic explosion and the rising of diverse requirements lead to many challenges for traditional mobile network architecture on flexibility, scalability, and deployability. To meet new requirements in the 5 G era, service based architecture is introduced into mobile networks. The monolithic network elements(e.g., MME, PGW, etc.) are split into smaller network functions to provide customized services. However, the management and deployment of network functions in service based 5 G core network are still big challenges. In this paper, we propose a novel management architecture for 5 G service based core network based on NFV and SDN. Combined with SDN, NFV and edge computing, the proposed framework can provide distributed and on-demand deployment of network functions, service guaranteed network slicing, flexible orchestration of network functions and optimal workload allocation. Simulations are conducted to show that the proposed framework and algorithm are effective in terms of reducing network operating cost.
基金supported by the National Natural Science Foundation of China under Grant No.61072061the 111 Project of China under Grant No.B08004the Fundamental Research Funds for the Central Universities under Grant No.2013RC0114
文摘Understanding the dynamic traffic and usage characteristics of data services in cellular networks is important for optimising network resources and improving user experience.Recent studies have illustrated traffic characteristics from specific perspectives,such as user behaviour,device type,and applications.In this paper,we present the results of our study from a different perspective,namely service providers,to reveal the traffic characteristics of cellular data networks.Our study is based on traffic data collected over a five-day period from a leading mobile operator's core network in China.We propose a Zipf-like model to characterise the distributions of the traffic volume,subscribers,and requests among service providers.Nine distinct diurnal traffic patterns of service providers are identified by formulating and solving a time series clustering problem.Our work differs from previous related works in that we perform measurements on a large quantity of data covering 2.2 billion traffic records,and we first explore the traffic patterns of thousands of service providers.Results of our study present mobile Internet participants with a better understanding of the traffic and usage characteristics of service providers,which play a critical role in the mobile Internet era.
基金supported in part by the National Natural Science Foundation of China (Grant No. 61901052)in part by the 111 project (Grant No. B17007)in part by the Director Funds of Beijing Key Laboratory of Network System Architecture and Convergence (Grant No. 2017BKL-NSACZJ-02)。
文摘In recent years, artificial intelligence and automotive industry have developed rapidly, and autonomous driving has gradually become the focus of the industry. In road networks, the problem of proximity detection refers to detecting whether two moving objects are close to each other or not in real time. However, the battery life and computing capability of mobile devices are limited in the actual scene,which results in high latency and energy consumption. Therefore, it is a tough problem to determine the proximity relationship between mobile users with low latency and energy consumption. In this article, we aim at finding a tradeoff between latency and energy consumption. We formalize the computation offloading problem base on mobile edge computing(MEC)into a constrained multiobjective optimization problem(CMOP) and utilize NSGA-II to solve it. The simulation results demonstrate that NSGA-II can find the Pareto set, which reduces the latency and energy consumption effectively. In addition, a large number of solutions provided by the Pareto set give us more choices of the offloading decision according to the actual situation.
基金Supported by the National Natural Science Foundation of China under Grant No 61100206the Beijing Natural Science Foundation under Grant No 4142036the Research Fund for Doctoral Program of Higher Education of China under Grant No20120005130001
文摘Applying network duality and elastic mechanics, we investigate the interactions among Internet flows by con- structing a weighted undirected network, where the vertices and the edges represent the flows and the mutual dependence between flows, respectively. Based on the obtained flow interaction network, we find the existence of 'super flow' in the Internet, indicating that some flows have a great impact on a huge number of other flows; moreover, one flow can spread its influence to another through a limited quantity of flows (less than 5 in the experimental simulations), which shows strong small-world characteristics like the social network. To reflect the flow interactions in the physical network congestion evaluation, the 'congestion coefficient' is proposed as a new metric which shows a finer observation on congestion than the eonventional one.
基金supported by 111 Project of China under Grant No.B08004
文摘Security and privacy issues are magnified by velocity, volume, and variety of big data. User's privacy is an even more sensitive topic attracting most people's attention. While XcodeGhost, a malware of i OS emerging in late 2015, leads to the privacy-leakage of a large number of users, only a few studies have examined XcodeGhost based on its source code. In this paper we describe observations by monitoring the network activities for more than 2.59 million i Phone users in a provincial area across 232 days. Our analysis reveals a number of interesting points. For example, we propose a decay model for the prevalence rate of Xcode Ghost and we find that the ratio of the infected devices is more than 60%; that a lot of popular applications, such as Wechat, railway 12306, didi taxi, Youku video are also infected; and that the duration as well as the traffic volume of most Xcode Ghost-related HTTP-requests is similar with usual HTTP-request which makes it difficult to be found. Besides, we propose a heuristic model based on fingerprint and its web-knowledge to identify the infected applications. The identifying result shows the efficiency of this model.
文摘Understanding the characteristics and predicting the popularity of the newly published online videos can provide direct implications in various contexts such as service design, advertisement planning, network management and etc. In this paper, we collect a real-world large-scale dataset from a leading online video service provider in China, namely Youku. We first analyze the dynamics of content publication and content popularity for the online video service. Then, we propose a rich set of features and exploit various effective classification methods to estimate the future popularity level of an individual video in various scenarios. We show that the future popularity level of a video can be predicted even before the video's release, and by introducing the historical popularity information the prediction performance can be improved dramatically. In addition, we investigate the importance of each feature group and each feature in the popularity prediction, and further reveal the factors that may impact the video popularity. We also discuss how the early monitoring period influences the popularity level prediction. Our work provides an insight into the popularity of the newly published online videos, and demonstrates promising practical applications for content publishers,service providers, online advisers and network operators.
基金supported by National Natural Science Foundation of China(Grant No.61471053,61901052)Fundamental Research Funds for the Central Universities(Grant 2018RC03)Beijing Laboratory of Advanced Information Networks
文摘The computation resources at a single node in Edge Computing(EC)are commonly limited,which cannot execute large scale computation tasks.To face the challenge,an Offloading scheme leveraging on NEighboring node Resources(ONER)for EC over Fiber-Wireless(FiWi)access networks is proposed in this paper.In the ONER scheme,the FiWi network connects edge computing nodes with fiber and converges wireless and fiber connections seamlessly,so that it can support the offloading transmission with low delay and wide bandwidth.Based on the ONER scheme supported by FiWi networks,computation tasks can be offloaded to edge computing nodes in a wider range of area without increasing wireless hops(e.g.,just one wireless hop),which achieves low delay.Additionally,an efficient Computation Resource Scheduling(CRS)algorithm based on the ONER scheme is also proposed to make offloading decision.The results show that more offloading requests can be satisfied and the average completion time of computation tasks decreases significantly with the ONER scheme and the CRS algorithm.Therefore,the ONER scheme and the CRS algorithm can schedule computation resources at neighboring edge computing nodes for offloading to meet the challenge of large scale computation tasks.
基金supported in part by the National Natural Science Foundation of China under Grant No.61072061the National Science and Technology Major Projects under Grant No.2012ZX03002008the Fundamental Research Funds for the Central Universities under Grant No.2012RC0121
文摘The ability of accurate and scalable mobile device recognition is critically important for mobile network operators and ISPs to understand their customers' behaviours and enhance their user experience.In this paper,we propose a novel method for mobile device model recognition by using statistical information derived from large amounts of mobile network traffic data.Specifically,we create a Jaccardbased coefficient measure method to identify a proper keyword representing each mobile device model from massive unstructured textual HTTP access logs.To handle the large amount of traffic data generated from large mobile networks,this method is designed as a set of parallel algorithms,and is implemented through the MapReduce framework which is a distributed parallel programming model with proven low-cost and high-efficiency features.Evaluations using real data sets show that our method can accurately recognise mobile client models while meeting the scalability and producer-independency requirements of large mobile network operators.Results show that a 91.5% accuracy rate is achieved for recognising mobile client models from 2 billion records,which is dramatically higher than existing solutions.
基金supported by National 863 Project SS2015AA011709
文摘Wo T(Web of Things) integrates smart devices into Web by reusing and extending Web standards. While Web technology makes the developers' job easier,it faces security,management and efficiency challenges. We propose Wo T/SDN,the architecture of resource oriented Wo T built on SDN(Software Defined Network),in which applications could be developed through resource subscription and Mashup with the programmability provided by SDN. The key components are designed,including Security and Management Controller(SMC),various atomic services and resource subscription syntax. Three applications covering device management,data access and security protection are demonstrated. Compared to traditional resource-oriented Wo T systems,our test results show that SDN,with its logically centralized control capability and awareness of flow forwarding,provides new opportunity to improve performance,simplify management and enhance security for Wo T.
基金supported in part by program for National Natural Science Foundation of China under Grant No.61271184863 Program of China under Grant No.2013AA013301New Century Excellent Talents in University under Grant No.NCET-11-0594
文摘Transmission among the cognitive users(CUs)' is always interrupted by the primary users(PUs)' reclaim of the spectrum and the fading effect of wireless channels.To maintain reliable continuous communication among CUs,an efficient scheme for link maintenance in OFDM-based cognitive radio Ad Hoc networks is proposed in this paper.In the scheme,redundant sub-channels(RSC) are employed by CUs to tackle the outage problem caused by the PUs' reclaim of the spectrum and wireless fading effect in the transmission.Meanwhile,backup sub-channels(BSC) are arranged to help select sub-channels with better channel quality.Additionally,to lower the overhead and improve the accuracy of the spectrum sensing,a partial sensing module is designed to enable the CUs to inherit and update the original idle spectrum list until it expires.Simulation results show that the proposed scheme can realize higher throughput and lower sensing overhead with slight reduction of the forced termination probability(FTP) performance compared to the existing approaches.
基金supported by the National Basic Research Program of China under Grants No.2012CB315801,No.2011CB302901the National Science and Technology Major Projects under Grant No.2010ZX03004-002-02
文摘Previous Virtual Network (VN) embedding researches mostly focus on developing heuristic algorithms to enhance the efficiency of a physical resource. However, in the equal-scale condition, where the scale of a VN is similar to that of a substrate network, the number of successfully mapped VNs decreases sharply since bottlenecks form easily in the substrate network and disturb the embedding process. In this paper, reversed and bidirectional irrigation methods are proposed for the equal-scale and all-scale conditions. The two proposed methods can be combined with most of the existing heuristic algorithms and map a relatively large number of VNs by reducing the potential substrate bottlenecks. The simulation results show that the reversed irrigation method almost doubles the successfully mapped Revenue than the traditional one in the equal-scale condition. Meanwhile, the bidirectional irrigation method achieves the synthetically best performance in almost all scale conditions.
基金supported in part by the Beijing Natural Science Foundation under Grant No.L202003the National Natural Science Foundation of China under Grant U22B2001 and 62271065the Project of China Railway Corporation under Grant N2022G048.
文摘Millimeter wave(mmWave)massive multiple-input multiple-output(MIMO)plays an important role in the fifth-generation(5G)mobile communications and beyond wireless communication systems owing to its potential of high capacity.However,channel estimation has become very challenging due to the use of massive MIMO antenna array.Fortunately,the mmWave channel has strong sparsity in the spatial angle domain,and the compressed sensing technology can be used to convert the original channel matrix into the sparse matrix of discrete angle grid.Thus the high-dimensional channel matrix estimation is transformed into a sparse recovery problem with greatly reduced computational complexity.However,the path angle in the actual scene appears randomly and is unlikely to be completely located on the quantization angle grid,thus leading to the problem of power leakage.Moreover,multiple paths with the random distribution of angles will bring about serious interpath interference and further deteriorate the performance of channel estimation.To address these off-grid issues,we propose a parallel interference cancellation assisted multi-grid matching pursuit(PIC-MGMP)algorithm in this paper.The proposed algorithm consists of three stages,including coarse estimation,refined estimation,and inter-path cyclic iterative inter-ference cancellation.More specifically,the angular resolution can be improved by locally refining the grid to reduce power leakage,while the inter-path interference is eliminated by parallel interference cancellation(PIC),and the two together improve the estimation accuracy.Simulation results show that compared with the traditional orthogonal matching pursuit(OMP)algorithm,the normalized mean square error(NMSE)of the proposed algorithm decreases by over 14dB in the case of 2 paths.
基金supported by the Natural Science Foundation of Beijing Municipality under Grant L192034。
文摘In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.
文摘The virtual network embedding/mapping problem is an important issue in network virtualization in Software-Defined Networking(SDN).It is mainly concerned with mapping virtual network requests,which could be a set of SDN flows,onto a shared substrate network automatically and efficiently.Previous researches mainly focus on developing heuristic algorithms for general topology virtual network.In practice however,the virtual network is usually generated with specific topology for specific purpose.Thus,it is a challenge to optimize the heuristic algorithms with these topology information.In order to deal with this problem,we propose a topology-cognitive algorithm framework,which is composed of a guiding principle for topology algorithm developing and a compound algorithm.The compound algorithm is composed of several subalgorithms,which are optimized for specific topologies.We develop star,tree,and ring topology algorithms as examples,other subalgorithms can be easily achieved following the same framework.The simulation results show that the topology-cognitive algorithm framework is effective in developing new topology algorithms,and the developed compound algorithm greatly enhances the performance of the Revenue/Cost(R/C) ratio and the Runtime than traditional heuristic algorithms for multi-topology virtual network embedding problem.
基金This paper was partially supported by the National Natural Science Foundation of China under Crant No. 61072061111 Project of China under Crant No. B08004 the Fundamental Research Funds for the Central Universities under Grant No. 2009RC0122. References
文摘Based on the massive data collected with a passive network monitoring equipment placed in China's backbone, we present a deep insight into the network backbone traffic and evaluate various ways for inproving traffic classifying efficiency in this pa- per. In particular, the study has scrutinized the net- work traffic in terms of protocol types and signatures, flow length, and port distffoution, from which mean- ingful and interesting insights on the current Intemet of China from the perspective of both the packet and flow levels are derived. We show that the classifica- tion efficiency can be greatly irrproved by using the information of preferred ports of the network applica- tions. Quantitatively, we find two traffic duration thresholds, with which 40% of TCP flows and 70% of UDP flows can be excluded from classification pro- cessing while the in^act on classification accuracy is trivial, i.e., the classification accuracy can still reach a high level by saving 85% of the resources.
基金supported in part by National Natural Science Foundation of China(61671078)the Director Funds of Beijing Key Laboratory of Network System Architecture and Convergence(2017BKL-NSACZJ-06)
文摘The rapid development of mobile network brings opportunities for researchers to analyze user behaviors based on largescale network traffic data. It is important for Internet Service Providers(ISP) to optimize resource allocation and provide customized services to users. The first step of analyzing user behaviors is to extract information of user actions from HTTP traffic data by multi-pattern URL matching. However, the efficiency is a huge problem when performing this work on massive network traffic data. To solve this problem, we propose a novel and accurate algorithm named Multi-Pattern Parallel Matching(MPPM) that takes advantage of HashMap in data searching for extracting user behaviors from big network data more effectively. Extensive experiments based on real-world traffic data prove the ability of MPPM algorithm to deal with massive HTTP traffic with better performance on accuracy, concurrency and efficiency. We expect the proposed algorithm and it parallelized implementation would be a solid base to build a high-performance analysis engine of user behavior based on massive HTTP traffic data processing.
文摘In order to reduce the interference,a novel,cluster-based medium access control(MAC)protocol with load aware for VANETs is proposed in this paper.First,all vehicles on roads are grouped into stable clusters in the light of their direction,number of neighbors,link reliability,and traffic load.By utilizing the advantages of centralized control in software defined VANETs(SDVN),cluster stability can be maintained in real-time.Second,a contention-free MAC mechanism composed of inter-cluster multi-channel allocation and intra-cluster dynamic TDMA frame allocation is proposed to prevent co-channel interference and hidden terminal interference.Simulation results show that the proposed protocol outperforms some existing protocols in cluster stability,delivery ratio,throughput and delay performance.
基金funded by National Natural Science Foundation of China under Grant No.61171107Beijing Natural Science Foundation under Grant No.4122034+1 种基金863 Program of China under Grant No.2011AA100706the Fundamental Research Funds for the Central Universities under Grant No.G470519
文摘Energy conservation in Wireless Sensor Networks (WSNs) has always been a crucial issue and has received increased attention in the recent years. A transmission scheme for energy-constrained WSNs is proposed in this paper. The scheme, called MIHOP (MIMO and Multi-hop), combines cluster-based virtual MIMO and multi-hop technologies. The multihop mode is employed in transmitting data when the related sensors are located within a specific number of hops from the sink, and the virtual MIMO mode is used in transmitting data from the remaining sensor nodes. We compare the energy consumption of different transmission schemes and propose an algorithm for determining the optimal hop count in MIHOP. A controllable mobile sink that reduces the energy consumed in sensor transmission is also adopted for data collection. The theoretical analysis and the Monte Carlo simulation demonstrate that the proposed scheme significantly outperforms individual virtual MIMO, multi-hop technologies, and double-string networks in terms of energy conservation. The energy consumption levels under the MIHOP scheme are approximately 12.98%, 47.55% and 48.30% less than that under virtual MIMO schemes, multi-hop networks and doublestring networks, respectively.
基金supported by the National Key Technology R&D Program of China(2012ZX03001031-004)the Fundamental Research Funds for the Central Universities (BUPT 2013RC0111)
文摘In orthogonal frequency division multiple access(OFDMA) based femtocell networks,the co-tier interference among femto base stations(FBS) becomes important in multiuser and densely deployed environment.In order to mitigate the co-tier interference and enhance the system total throughput,this paper proposed a best effort spectrum allocation scheme based on the extension of graph theory.In the scheme,a controller was proposed to collect the channel state information(CSI)of all femtocell user equipments(FUEs) in a certain range.Then,the controller evaluated the signal-to-interference Ratio(SIR) of each FUE and determined the set of its interference neighbors.By calculating the received power matrix(RPM) among FUEs and building interference graph matrix(IGM),different spectrum resource blocks(RBs) were assigned to the users with interference relation,while users without interference relation shared the same RBs,which could increase the spectrum efficiency.Simulation results show that the proposed algorithm can significantly improve the RB usage efficiency compared with the basic graph coloring theory,and more than 80% improvement can be acquired in dense deployment scenario.Besides,the throughput of both cell edge macro user equipments(MUEs) and cell edge FUEs is guaranteed on the premise of low interference.