Yoshinori TANAKA Takashi DATEKI
Efficient multiplexing of ultra-reliable and low-latency communications (URLLC) and enhanced mobile broadband (eMBB) traffic, as well as ensuring the various reliability requirements of these traffic types in 5G wireless communications, is becoming increasingly important, particularly for vertical services. Interference management techniques, such as coordinated inter-cell scheduling, can enhance reliability in dense cell deployments. However, tight inter-cell coordination necessitates frequent information exchange between cells, which limits implementation. This paper introduces a novel RAN slicing framework based on centralized frequency-domain interference control per slice and link adaptation optimized for URLLC. The proposed framework does not require tight inter-cell coordination but can fulfill the requirements of both the decoding error probability and the delay violation probability of each packet flow. These controls are based on a power-law estimation of the lower tail distribution of a measured data set with a smaller number of discrete samples. As design guidelines, we derived a theoretical minimum radio resource size of a slice to guarantee the delay violation probability requirement. Simulation results demonstrate that the proposed RAN slicing framework can achieve the reliability targets of the URLLC slice while improving the spectrum efficiency of the eMBB slice in a well-balanced manner compared to other evaluated benchmarks.
Kairi TOKUDA Takehiro SATO Eiji OKI
Mobile edge computing (MEC) is a key technology for providing services that require low latency by migrating cloud functions to the network edge. The potential low quality of the wireless channel should be noted when mobile users with limited computing resources offload tasks to an MEC server. To improve the transmission reliability, it is necessary to perform resource allocation in an MEC server, taking into account the current channel quality and the resource contention. There are several works that take a deep reinforcement learning (DRL) approach to address such resource allocation. However, these approaches consider a fixed number of users offloading their tasks, and do not assume a situation where the number of users varies due to user mobility. This paper proposes Deep reinforcement learning model for MEC Resource Allocation with Dummy (DMRA-D), an online learning model that addresses the resource allocation in an MEC server under the situation where the number of users varies. By adopting dummy state/action, DMRA-D keeps the state/action representation. Therefore, DMRA-D can continue to learn one model regardless of variation in the number of users during the operation. Numerical results show that DMRA-D improves the success rate of task submission while continuing learning under the situation where the number of users varies.
Rongcheng DONG Taisuke IZUMI Naoki KITAMURA Yuichi SUDO Toshimitsu MASUZAWA
The maximal independent set (MIS) problem is one of the most fundamental problems in the field of distributed computing. This paper focuses on the MIS problem with unreliable communication between processes in the system. We propose a relaxed notion of MIS, named almost MIS (ALMIS), and show that the loosely-stabilizing algorithm proposed in our previous work can achieve exponentially long holding time with logarithmic convergence time and space complexity regarding ALMIS, which cannot be achieved at the same time regarding MIS in our previous work.
In this paper, we propose a combined method of GCR Block Ack and Unsolicited Retry for binary data lossless groupcast over wireless LANs. The two mechanisms are standardized as IEEE 802.11aa GCR for audiovisual transmission. In the proposed method, the sender transmits each frame twice without acknowledgment as Unsolicited Retry under lossy wireless link conditions. After transmitting twice, the sender enters the Block Ack sequence. In addition, we apply TXOP-Bursting, which allows a terminal to send frames sequentially with high priority during the TXOP limit, to the combined method. To show the proposal's effectiveness, we carry out a computer simulation. We assume binary data transmission of about 40MB and assess the time of complete reception at all the receivers. From the result, we find that the proposed method can shorten the received time against the conventional Block Ack method.
Hequn LI Die LIU Jiaxi LU Hai ZHAO Jiuqiang XU
Industrial networks need to provide reliable communication services, usually in a redundant transmission (RT) manner. In the past few years, several device-redundancy-based, layer 2 solutions have been proposed. However, with the evolution of industrial networks to the Industrial Internet, these methods can no longer work properly in the non-redundancy, layer 3 environments. In this paper, an SDN-based reliable communication framework is proposed for the Industrial Internet. It can provide reliable communication guarantees for mission-critical applications while servicing non-critical applications in a best-effort transmission manner. Specifically, it first implements an RT-based reliable communication method using the Industrial Internet's link-redundancy feature. Next, it presents a redundant synchronization mechanism to prevent end systems from receiving duplicate data. Finally, to maximize the number of critical flows in it (an NP-hard problem), two ILP-based routing & scheduling algorithms are also put forward. These two algorithms are optimal (Scheduling with Unconstrained Routing, SUR) and suboptimal (Scheduling with Minimum length Routing, SMR). Numerous simulations are conducted to evaluate its effectiveness. The results show that it can provide reliable, duplicate-free services to end systems. Its reliable communication method performs better than the conventional best-effort transmission method in terms of packet delivery success ratio in layer 3 networks. In addition, its scheduling algorithm, SMR, performs well on the experimental topologies (with average quality of 93% when compared to SUR), and the time overhead is acceptable.
We consider a reliable decentralized supervisory control problem for discrete event systems in the inference-based framework. This problem requires us to synthesize local supervisors such that the controlled system achieves the specification and is nonblocking, even if local control decisions of some local supervisors are not available for making the global control decision. In the case of single-level inference, we introduce a notion of reliable 1-inference-observability and show that reliable 1-inference-observability together with controllability and Lm(G)-closedness is a necessary and sufficient condition for the existence of a solution to the reliable decentralized supervisory control problem.
Zhaogang SHU Tarik TALEB Jaeseung SONG
Through the concept of network slicing, a single physical network infrastructure can be split into multiple logically-independent Network Slices (NS), each of which is customized for the needs of its respective individual user or industrial vertical. In the beyond 5G (B5G) system, this customization can be done for many targeted services, including, but not limited to, 5G use cases and beyond 5G. The network slices should be optimized and customized to stitch a suitable environment for targeted industrial services and verticals. This paper proposes a novel Quality of Service (QoS) framework that optimizes and customizes the network slices to ensure the service level agreement (SLA) in terms of end-to-end reliability, delay, and bandwidth communication. The proposed framework makes use of network softwarization technologies, including software-defined networking (SDN) and network function virtualization (NFV), to preserve the SLA and ensure elasticity in managing the NS. This paper also mathematically models the end-to-end network by considering three parts: radio access network (RAN), transport network (TN), and core network (CN). The network is modeled in an abstract manner based on these three parts. Finally, we develop a prototype system to implement these algorithms using the open network operating system (ONOS) as a SDN controller. Simulations are conducted using the Mininet simulator. The results show that our QoS framework and the proposed resource allocation algorithms can effectively schedule network resources for various NS types and provide reliable E2E QoS services to end-users.
Hideya SO Kazuhiko FUKAWA Hayato SOYA Yuyuan CHANG
In unlicensed spectrum, wireless communications employing carrier sense multiple access with collision avoidance (CSMA/CA) suffer from longer transmission delay time as the number of user terminals (UTs) increases, because packet collisions are more likely to occur. To cope with this problem, this paper proposes a new multiuser detection (MUD) scheme that uses both request-to-send (RTS) and enhanced clear-to-send (eCTS) for high-reliable and low-latency wireless communications. As in conventional MUD scheme, the metric-combining MUD (MC-MUD) calculates log likelihood functions called metrics and accumulates the metrics for the maximum likelihood detection (MLD). To avoid increasing the number of states for MLD, MC-MUD forces the relevant UTs to retransmit their packets until all the collided packets are correctly detected, which requires a kind of central control and reduces the system throughput. To overcome these drawbacks, the proposed scheme, which is referred to as cancelling MC-MUD (CMC-MUD), deletes replicas of some of the collided packets from the received signals, once the packets are correctly detected during the retransmission. This cancellation enables new UTs to transmit their packets and then performs MLD without increasing the number of states, which improves the system throughput without increasing the complexity. In addition, the proposed scheme adopts RTS and eCTS. One UT that suffers from packet collision transmits RTS before the retransmission. Then, the corresponding access point (AP) transmits eCTS including addresses of the other UTs, which have experienced the same packet collision. To reproduce the same packet collision, these other UTs transmit their packets once they receive the eCTS. Computer simulations under one AP conditions evaluate an average carrier-to-interference ratio (CIR) range in which the proposed scheme is effective, and clarify that the transmission delay time of the proposed scheme is shorter than that of the conventional schemes. In two APs environments that can cause the hidden terminal problem, it is demonstrated that the proposed scheme achieves shorter transmission delay times than the conventional scheme with RTS and conventional CTS.
Hideya SO Takafumi FUJITA Kento YOSHIZAWA Maiko NAYA Takashi SHIMIZU
This paper proposes a novel radio access scheme that uses duplicated transmission via multiple frequency channels to achieve mission critical Internet of Things (IoT) services requiring highly reliable wireless communications; the interference constraints that yield the required reliability are revealed. To achieve mission critical IoT services by wireless communication, it is necessary to improve reliability in addition to satisfying the required transmission delay time. Reliability is defined as the packet arrival rate without exceeding the desired transmission delay time. Traffic of the own system and interference from the other systems using the same frequency channel such as unlicensed bands degrades the reliability. One solution is the frequency/time diversity technique. However, these techniques may not achieve the required reliability because of the time taken to achieve the correct reception. This paper proposes a novel scheme that transmits duplicate packets utilizing multiple wireless interfaces over multiple frequency channels. It also proposes a suppressed duplicate transmission (SDT) scheme, which prevents the wastage of radio resources. The proposed scheme achieves the same reliable performance as the conventional scheme but has higher tolerance against interference than retransmission. We evaluate the relationship between the reliability and the occupation time ratio where the interference occupation time ratio is defined as the usage ratio of the frequency resources occupied by the other systems. We reveal the upper bound of the interference occupation time ratio for each frequency channel, which is needed if channel selection control is to achieve the required reliability.
Guodong WU Chao DONG Aijing LI Lei ZHANG Qihui WU Kun ZHOU
With no need for Road Side Unit (RSU), multi-hop Vehicular Ad Hoc NETworks (VANETs) have drawn more and more attention recently. Considering the safety of vehicles, a Media Access Control (MAC) protocol for reliable transmission is critical for multi-hop VANETs. Most current works need RSU to handle the collisions brought by hidden-terminal problem and the mobility of vehicles. In this paper, we proposed RV-MAC, which is a reliable MAC protocol for multi-hop VANETs based on Time Division Multiple Access (TDMA). First, to address the hidden-terminal under the networks with multi-hop topology, we design a region marking scheme to divide vehicles into different regions. Then a collisions avoidance scheme is proposed to handle the collisions owing to channel competition and the mobility of vehicles. Simulation results show that compared with other protocol, RV-MAC can decrease contention collisions by 30% and encounter collisions by 50% respectively. As a result, RV-MAC achieves higher throughput and lower network delay.
Sukhumarn ARCHASANTISUK Takahiro AOYAGI
Communication reliability and energy efficiency are important issues that have to be carefully considered in WBAN design. Due to the large path loss variation of the WBAN channel, transmission power control, which adaptively adjusts the radio transmit power to suit the channel condition, is considered in this paper. Human motion is one of the dominant factors that affect the channel characteristics in WBAN. Therefore, this paper introduces motion-aware temporal correlation model-based transmission power control that combines human motion classification and transmission power control to provide an effective approach to realizing reliable and energy-efficient WBAN communication. The human motion classification adopted in this study uses only the received signal strength to identify the human motion; no additional tool is required. The knowledge of human motion is then used to accurately estimate the channel condition and suitably select the transmit power. A performance evaluation shows that the proposed method works well both in the low and high WBAN network loads. Compared to using the fixed Tx power of -5dBm, the proposed method had similar packet loss rate but 20-28 and 27-33 percent lower average energy consumption for the low network traffic and high network traffic cases, respectively.
Tadahide KUNITACHI Kazuhiko KINOSHITA Takashi WATANABE
Recent works on enhancing the comfort and convenience of vehicles have revealed the advantage of various wireless sensor nodes for information collection. For the highly required reliability in vehicles, Reliable Wireless Communication based on Substitute Forwarding (RWCSF) has been proposed. It ensures that 99.999% of communications can finish within 20ms, which is the quality of communication equivalent to wired links. However, the performance was evaluated in very limited situations, where two or more communications never occurred simultaneously and no noise was present. In this paper, we enhance RWCSF to achieve the target communication quality even if two or more communications occur simultaneously. In addition, we evaluate the enhanced method in various types of vehicles that create internal noise.
In this study, we propose a statistical reputation approach for constructing a reliable packet route in ad-hoc sensor networks. The proposed method uses reputation as a measurement for router node selection through which a reliable data route is constructed for packet delivery. To refine the reputation, a transaction density is defined here to showcase the influence of node transaction frequency over the reputation. And to balance the energy consumption and avoid choosing repetitively the same node with high reputation, node remaining energy is also considered as a reputation factor in the selection process. Further, a shortest-path-tree routing protocol is designed so that data packets can reach the base station through the minimum intermediate nodes. Simulation tests illustrate the improvements in the packet delivery ratio and the energy utilization.
Qiuli CHEN Ming HE Fei DAI Chaozheng ZHU
The changes of temperature, salinity and ocean current in underwater environment, have adverse effects on the communication range of sensors, and make them become temporary failure. These temporarily misbehaving sensors are called dumb nodes. In this paper, an energy-efficient connectivity re-establishment (EECR) scheme is proposed. It can reconstruct the topology of underwater acoustic sensor networks (UASNs) with the existing of dumb nodes. Due to the dynamic of underwater environment, the generation and recovery of dumb nodes also change dynamically, resulting in intermittent interruption of network topology. Therefore, a multi-band transmission mode for dumb nodes is designed firstly. It ensures that the current stored data of dumb nodes can be sent out in time. Subsequently, a connectivity re-establishment scheme of sub-nodes is designed. The topology reconstruction is adaptively implemented by changing the current transmission path. This scheme does't need to arrange the sleep nodes in advance. So it can reduce the message expenses and energy consumption greatly. Simulation results show that the proposed method has better network performance under the same conditions than the classical algorithms named LETC and A1. What's more, our method has a higher network throughput rate when the nodes' dumb behavior has a shorter duration.
Wei HAN Baosheng WANG Zhenqian FENG Baokang ZHAO Wanrong YU Zhu TANG
Border Gateway Protocol (BGP), with its advantages in routing isolation support and mature application, is a promising candidate to integrate satellite systems into the terrestrial IP network. However, with more and more ground stations accessing satellites by BGP, a significant amount of routing overhead can be produced on limited satellite links, especially for geostationary satellite networks with thousands of accessing terminals in extremely large areas. To solve this challenge, multicast transport of BGP was proposed, which takes advantage of the inherent broadcast property of wireless channels. However, its performance can be seriously degraded when interfered with the environment. In this paper, NCSR (Network Coding for Satellite network BGP Routing transport) [1] is explored in depth. Unlike existing counterparts, NCSR pays more attention to the lossy space links and can achieve reliability with more bandwidth savings. A greedy based coding algorithm is proposed to realize the network coding operation. To demonstrate the efficiency of NCSR, we conduct theoretical analyses and extensive simulations in typical scenarios of satellite systems. Simulation results show that NCSR can greatly reduce the bandwidth usage while achieving comparable latency. Discussions on practical considerations when applying network coding method for reliability assurance are also presented in detail.
Sang-Wan KIM Yongbin YIM Hosung PARK Ki-Dong NAM Sang-Ha KIM
Energy-efficient tracking of continuous objects such as fluids, gases, and wild fires is one of the important challenging issues in wireless sensor networks. Many studies have focused on electing fewer nodes to report the boundary information of continuous objects for energy saving. However, this approach of using few reporting packets is very sensitive to packet loss. Many applications based on continuous objects tracking require timely and precise boundary information due to the danger posed by the objects. When transmission of reporting packets fails, applications are unable to track the boundary reliably and a delay is imposed to recover. The transmission failure can fatally degrade application performance. Thus, it is necessary to consider just-in-time recovery for reliable continuous object tracking. Nevertheless, most schemes did not consider the reliable tracking to handle the situation that packet loss happen. Recently, a scheme called I-COD with retransmission was proposed to recover lost packets but it leads to increasing both the energy consumption and the tracking latency owing to the retransmission. Thus, we propose a reliable tracking scheme that uses fast recovery with the redundant boundary information to track continuous objects in real-time and energy-efficiently. In the proposed scheme, neighbor nodes of boundary nodes gather the boundary information in duplicate and report the redundant boundary information. Then the sink node can recover the lost packets fast by using the redundant boundary information. The proposed scheme provides the reliable tracking with low latency and no retransmissions. In addition, the proposed scheme saves the energy by electing fewer nodes to report the boundary information and performing the recovery without retransmissions. Our simulation results show that the proposed scheme provides the energy-efficient and reliable tracking in real-time for the continuous objects.
Xuan Sam NGUYEN Daehee KIM Sunshin AN
The new generation of telemedicine systems enables healthcare service providers to monitor patients not only in the hospital but also when they are at home. In order to efficiently exploit these systems, human information collected from end devices must be sent to the medical center through reliable data transmission. In this paper, we propose an adaptive relay transmission scheme to improve the reliability of data transmission for wireless body area networks. In our proposal, relay nodes that have successfully decoded a packet from the source node are selected as relay nodes in which the best relay with the highest channel gain is selected to forward the failed packet instead of the source node. The scheme addresses both the data collision problem and the inefficient relay selection in relay transmission. Our experimental results show that the proposed scheme provides a better performance than previous works in terms of the packet delivery ratio and end-to-end delay.
A threshold secret sharing scheme protects content by dividing it into many pieces and distributing them among different servers. This scheme can also be utilized for the reliable delivery of important content. Thanks to this scheme, the receiver can still reconstruct the original content even if several pieces are lost during delivery due to a multiple-link failure. Nevertheless, the receiver cannot reconstruct the original content unless it receives pieces more than or equal to the threshold. This paper aims to obtain reliable delivery routes for the pieces, as this will minimize the probability that the receiver cannot reconstruct the original content. Although such a route optimization problem can be formulated using an integer linear programming (ILP) model, computation of globally optimum delivery routes based on the ILP model requires large amounts of computational resources. Thus, this paper proposes a lightweight method for computing suboptimum delivery routes. The proposed greedy method computes each of the delivery routes successively by using the conventional shortest route algorithm repeatedly. The link distances are adjusted iteratively on the basis of the given probability of failure on each link and they are utilized for the calculation of each shortest route. The results of a performance evaluation show that the proposed method can compute sub-optimum delivery routes efficiently thanks to the precise adjustment of the link distances, even in backbone networks on a real-world scale.
Jang Woon BAEK Kee-Koo KWON Su-In LEE Dae-Wha SEO
This paper proposes a reliable data aggregation scheduling that uses caching and re-transmission based on track topology. In the proposed scheme, a node detects packet losses by overhearing messages that includes error indications of the child nodes, from its neighbor nodes. If packet losses are detected, as a backup parent, the node retransmits the lost packet. A retransmission strategy is added into the adaptive timeout scheduling scheme, which adaptively configures both the timeout and the collection period according to the potential level of an event occurrence. The retransmission steps cause an additional delay and power consumption of the sensor nodes, but dramatically increase the data accuracy of the aggregation results. An extensive simulation under various workloads shows that the proposed scheme outperforms other schemes in terms of data accuracy and energy consumption.
Ryota MIZUTANI Kentaro KOBAYASHI Hiraku OKADA Masaaki KATAYAMA
This paper discusses the reduction of the amount of transmitted information for the efficient use of frequency resources in wireless feedback control systems, and clarify the effect of the reduction of the amount of transmitted information. As a typical example of the underactuated controlled object, a rotary inverted pendulum is considered. We propose a reduction method for state information fed back from the controller to the controlled object. It estimates angle or velocity state from the previous state. In addition, we propose a reduction method that temporally omits less important control information and state information. Numerical examples clarify the effect of the reduction methods on the control quality. And we show that the reduction methods achieve large reduction of the amount of transmitted information with small disadvantage of the control quality.