-
Resource-Efficient Sensor Fusion via System-Wide Dynamic Gated Neural Networks
Authors:
Chetna Singhal,
Yashuo Wu,
Francesco Malandrino,
Sharon Ladron de Guevara Contreras,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
Mobile systems will have to support multiple AI-based applications, each leveraging heterogeneous data sources through DNN architectures collaboratively executed within the network. To minimize the cost of the AI inference task subject to requirements on latency, quality, and - crucially - reliability of the inference process, it is vital to optimize (i) the set of sensors/data sources and (ii) th…
▽ More
Mobile systems will have to support multiple AI-based applications, each leveraging heterogeneous data sources through DNN architectures collaboratively executed within the network. To minimize the cost of the AI inference task subject to requirements on latency, quality, and - crucially - reliability of the inference process, it is vital to optimize (i) the set of sensors/data sources and (ii) the DNN architecture, (iii) the network nodes executing sections of the DNN, and (iv) the resources to use. To this end, we leverage dynamic gated neural networks with branches, and propose a novel algorithmic strategy called Quantile-constrained Inference (QIC), based upon quantile-Constrained policy optimization. QIC makes joint, high-quality, swift decisions on all the above aspects of the system, with the aim to minimize inference energy cost. We remark that this is the first contribution connecting gated dynamic DNNs with infrastructure-level decision making. We evaluate QIC using a dynamic gated DNN with stems and branches for optimal sensor fusion and inference, trained on the RADIATE dataset offering Radar, LiDAR, and Camera data, and real-world wireless measurements. Our results confirm that QIC matches the optimum and outperforms its alternatives by over 80%.
△ Less
Submitted 22 October, 2024;
originally announced October 2024.
-
Combining Relevance and Magnitude for Resource-Aware DNN Pruning
Authors:
Carla Fabiana Chiasserini,
Francesco Malandrino,
Nuria Molner,
Zhiqiang Zhao
Abstract:
Pruning neural networks, i.e., removing some of their parameters whilst retaining their accuracy, is one of the main ways to reduce the latency of a machine learning pipeline, especially in resource- and/or bandwidth-constrained scenarios. In this context, the pruning technique, i.e., how to choose the parameters to remove, is critical to the system performance. In this paper, we propose a novel p…
▽ More
Pruning neural networks, i.e., removing some of their parameters whilst retaining their accuracy, is one of the main ways to reduce the latency of a machine learning pipeline, especially in resource- and/or bandwidth-constrained scenarios. In this context, the pruning technique, i.e., how to choose the parameters to remove, is critical to the system performance. In this paper, we propose a novel pruning approach, called FlexRel and predicated upon combining training-time and inference-time information, namely, parameter magnitude and relevance, in order to improve the resulting accuracy whilst saving both computational resources and bandwidth. Our performance evaluation shows that FlexRel is able to achieve higher pruning factors, saving over 35% bandwidth for typical accuracy targets.
△ Less
Submitted 27 March, 2025; v1 submitted 21 May, 2024;
originally announced May 2024.
-
Resource-aware Deployment of Dynamic DNNs over Multi-tiered Interconnected Systems
Authors:
Chetna Singhal,
Yashuo Wu,
Francesco Malandrino,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
The increasing pervasiveness of intelligent mobile applications requires to exploit the full range of resources offered by the mobile-edge-cloud network for the execution of inference tasks. However, due to the heterogeneity of such multi-tiered networks, it is essential to make the applications' demand amenable to the available resources while minimizing energy consumption. Modern dynamic deep ne…
▽ More
The increasing pervasiveness of intelligent mobile applications requires to exploit the full range of resources offered by the mobile-edge-cloud network for the execution of inference tasks. However, due to the heterogeneity of such multi-tiered networks, it is essential to make the applications' demand amenable to the available resources while minimizing energy consumption. Modern dynamic deep neural networks (DNN) achieve this goal by designing multi-branched architectures where early exits enable sample-based adaptation of the model depth. In this paper, we tackle the problem of allocating sections of DNNs with early exits to the nodes of the mobile-edge-cloud system. By envisioning a 3-stage graph-modeling approach, we represent the possible options for splitting the DNN and deploying the DNN blocks on the multi-tiered network, embedding both the system constraints and the application requirements in a convenient and efficient way. Our framework -- named Feasible Inference Graph (FIN) -- can identify the solution that minimizes the overall inference energy consumption while enabling distributed inference over the multi-tiered network with the target quality and latency. Our results, obtained for DNNs with different levels of complexity, show that FIN matches the optimum and yields over 65% energy savings relative to a state-of-the-art technique for cost minimization.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Eavesdropping with Intelligent Reflective Surfaces: Near-Optimal Configuration Cycling
Authors:
Francesco Malandrino,
Alessandro Nordio,
Carla Fabiana Chiasserini
Abstract:
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communication security and privacy. In this work, we focus on the latter aspect and introduce a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users that are facilitated by the presence of IRSs. Specifical…
▽ More
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communication security and privacy. In this work, we focus on the latter aspect and introduce a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users that are facilitated by the presence of IRSs. Specifically, we envision a transmission scheme that cycles across a number of IRS-to-user assignments, and we select them in a near-optimal fashion, thus guaranteeing both a high data rate and a good secrecy rate. Unlike most of the existing works addressing passive eavesdropping, the strategy we envision has low complexity and is suitable for scenarios where nodes are equipped with a limited number of antennas. Through our performance evaluation, we highlight the trade-off between the legitimate users' data rate and secrecy rate, and how the system parameters affect such a trade-off.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Dependable Distributed Training of Compressed Machine Learning Models
Authors:
Francesco Malandrino,
Giuseppe Di Giacomo,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
The existing work on the distributed training of machine learning (ML) models has consistently overlooked the distribution of the achieved learning quality, focusing instead on its average value. This leads to a poor dependability}of the resulting ML models, whose performance may be much worse than expected. We fill this gap by proposing DepL, a framework for dependable learning orchestration, abl…
▽ More
The existing work on the distributed training of machine learning (ML) models has consistently overlooked the distribution of the achieved learning quality, focusing instead on its average value. This leads to a poor dependability}of the resulting ML models, whose performance may be much worse than expected. We fill this gap by proposing DepL, a framework for dependable learning orchestration, able to make high-quality, efficient decisions on (i) the data to leverage for learning, (ii) the models to use and when to switch among them, and (iii) the clusters of nodes, and the resources thereof, to exploit. For concreteness, we consider as possible available models a full DNN and its compressed versions. Unlike previous studies, DepL guarantees that a target learning quality is reached with a target probability, while keeping the training cost at a minimum. We prove that DepL has constant competitive ratio and polynomial complexity, and show that it outperforms the state-of-the-art by over 27% and closely matches the optimum.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Human-Centric Decision-Making in Cell-Less 6G Networks
Authors:
Emma Chiaramello,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Alessandro Nordio,
Marta Parazzini,
Alvaro Valcarce
Abstract:
In next-generation networks, cells will be replaced by a collection of points-of-access (PoAs), with overlapping coverage areas and/or different technologies. Along with a promise for greater performance and flexibility, this creates further pressure on network management algorithms, which must make joint decisions on (i) PoA-to-user association and (ii) PoA management. We solve this challenging p…
▽ More
In next-generation networks, cells will be replaced by a collection of points-of-access (PoAs), with overlapping coverage areas and/or different technologies. Along with a promise for greater performance and flexibility, this creates further pressure on network management algorithms, which must make joint decisions on (i) PoA-to-user association and (ii) PoA management. We solve this challenging problem through an efficient and effective solution concept called Cluster-then-Match (CtM). Importantly, CtM makes human-centric decisions, where pure network performance is balanced against metrics like energy consumption and electromagnetic field exposure, which concern all humans in the network area -- including those who are not network users. Through our performance evaluation, which leverages detailed models for EMF exposure estimation and standard-specified signal propagation models, we show that CtM outperforms state-of-the-art network management schemes, including those utilizing machine learning, reducing energy consumption by over 80%.
△ Less
Submitted 30 July, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
Matching DNN Compression and Cooperative Training with Resources and Data Availability
Authors:
Francesco Malandrino,
Giuseppe Di Giacomo,
Armin Karamzade,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
To make machine learning (ML) sustainable and apt to run on the diverse devices where relevant data is, it is essential to compress ML models as needed, while still meeting the required learning quality and time performance. However, how much and when an ML model should be compressed, and {\em where} its training should be executed, are hard decisions to make, as they depend on the model itself, t…
▽ More
To make machine learning (ML) sustainable and apt to run on the diverse devices where relevant data is, it is essential to compress ML models as needed, while still meeting the required learning quality and time performance. However, how much and when an ML model should be compressed, and {\em where} its training should be executed, are hard decisions to make, as they depend on the model itself, the resources of the available nodes, and the data such nodes own. Existing studies focus on each of those aspects individually, however, they do not account for how such decisions can be made jointly and adapted to one another. In this work, we model the network system focusing on the training of DNNs, formalize the above multi-dimensional problem, and, given its NP-hardness, formulate an approximate dynamic programming problem that we solve through the PACT algorithmic framework. Importantly, PACT leverages a time-expanded graph representing the learning process, and a data-driven and theoretical approach for the prediction of the loss evolution to be expected as a consequence of training decisions. We prove that PACT's solutions can get as close to the optimum as desired, at the cost of an increased time complexity, and that, in any case, such complexity is polynomial. Numerical results also show that, even under the most disadvantageous settings, PACT outperforms state-of-the-art alternatives and closely matches the optimal energy cost.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Unexpectedly Useful: Convergence Bounds And Real-World Distributed Learning
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Convergence bounds are one of the main tools to obtain information on the performance of a distributed machine learning task, before running the task itself. In this work, we perform a set of experiments to assess to which extent, and in which way, such bounds can predict and improve the performance of real-world distributed (namely, federated) learning tasks. We find that, as can be expected give…
▽ More
Convergence bounds are one of the main tools to obtain information on the performance of a distributed machine learning task, before running the task itself. In this work, we perform a set of experiments to assess to which extent, and in which way, such bounds can predict and improve the performance of real-world distributed (namely, federated) learning tasks. We find that, as can be expected given the way they are obtained, bounds are quite loose and their relative magnitude reflects the training rather than the testing loss. More unexpectedly, we find that some of the quantities appearing in the bounds turn out to be very useful to identify the clients that are most likely to contribute to the learning process, without requiring the disclosure of any information about the quality or size of their datasets. This suggests that further research is warranted on the ways -- often counter-intuitive -- in which convergence bounds can be exploited to improve the performance of real-world distributed learning tasks.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Virtual Service Embedding with Time-Varying Load and Provable Guarantees
Authors:
Gil Einziger,
Gabriel Scalosub,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Deploying services efficiently while satisfying their quality requirements is a major challenge in network slicing. Effective solutions place instances of the services' virtual network functions (VNFs) at different locations of the cellular infrastructure and manage such instances by scaling them as needed. In this work, we address the above problem and the very relevant aspect of sub-slice reuse…
▽ More
Deploying services efficiently while satisfying their quality requirements is a major challenge in network slicing. Effective solutions place instances of the services' virtual network functions (VNFs) at different locations of the cellular infrastructure and manage such instances by scaling them as needed. In this work, we address the above problem and the very relevant aspect of sub-slice reuse among different services. Further, unlike prior art, we account for the services' finite lifetime and time-varying traffic load. We identify two major sources of inefficiency in service management: (i) the overspending of computing resources due to traffic of multiple services with different latency requirements being processed by the same virtual machine (VM), and (ii) the poor packing of traffic processing requests in the same VM, leading to opening more VMs than necessary. To cope with the above issues, we devise an algorithm, called REShare, that can dynamically adapt to the system's operational conditions and find an optimal trade-off between the aforementioned opposite requirements. We prove that REShare has low algorithmic complexity and is asymptotic 2-competitive under a non-decreasing load. Numerical results, leveraging real-world scenarios, show that our solution outperforms alternatives, swiftly adapting to time-varying conditions and reducing service cost by over 25%.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
Choose, not Hoard: Information-to-Model Matching for Artificial Intelligence in O-RAN
Authors:
Jorge Martín-Pérez,
Nuria Molner,
Francesco Malandrino,
Carlos Jesús Bernardos,
Antonio de la Oliva,
David Gomez-Barquero
Abstract:
Open Radio Access Network (O-RAN) is an emerging paradigm, whereby virtualized network infrastructure elements from different vendors communicate via open, standardized interfaces. A key element therein is the RAN Intelligent Controller (RIC), an Artificial Intelligence (AI)-based controller. Traditionally, all data available in the network has been used to train a single AI model to be used at th…
▽ More
Open Radio Access Network (O-RAN) is an emerging paradigm, whereby virtualized network infrastructure elements from different vendors communicate via open, standardized interfaces. A key element therein is the RAN Intelligent Controller (RIC), an Artificial Intelligence (AI)-based controller. Traditionally, all data available in the network has been used to train a single AI model to be used at the RIC. This paper introduces, discusses, and evaluates the creation of multiple AI model instances at different RICs, leveraging information from some (or all) locations for their training. This brings about a flexible relationship between gNBs, the AI models used to control them, and the data such models are trained with. Experiments with real-world traces show how using multiple AI model instances that choose training data from specific locations improve the performance of traditional approaches following the hoarding strategy.
△ Less
Submitted 12 January, 2023; v1 submitted 1 August, 2022;
originally announced August 2022.
-
Performance and EMF Exposure Trade-offs in Human-centric Cell-free Networks
Authors:
Francesco Malandrino,
Emma Chiaramello,
Marta Parazzini,
Carla Fabiana Chiasserini
Abstract:
In cell-free wireless networks, multiple connectivity options and technologies are available to serve each user. Traditionally, such options are ranked and selected solely based on the network performance they yield; however, additional information such as electromagnetic field (EMF) exposure could be considered. In this work, we explore the trade-offs between network performance and EMF exposure…
▽ More
In cell-free wireless networks, multiple connectivity options and technologies are available to serve each user. Traditionally, such options are ranked and selected solely based on the network performance they yield; however, additional information such as electromagnetic field (EMF) exposure could be considered. In this work, we explore the trade-offs between network performance and EMF exposure in a typical indoor scenario, finding that it is possible to significantly reduce the latter with a minor impact on the former. We further find that surrogate models represent an efficient and effective tool to model the network behavior.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Efficient Distributed DNNs in the Mobile-edge-cloud Continuum
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Giuseppe Di Giacomo
Abstract:
In the mobile-edge-cloud continuum, a plethora of heterogeneous data sources and computation-capable nodes are available. Such nodes can cooperate to perform a distributed learning task, aided by a learning controller (often located at the network edge). The controller is required to make decisions concerning (i) data selection, i.e., which data sources to use; (ii) model selection, i.e., which ma…
▽ More
In the mobile-edge-cloud continuum, a plethora of heterogeneous data sources and computation-capable nodes are available. Such nodes can cooperate to perform a distributed learning task, aided by a learning controller (often located at the network edge). The controller is required to make decisions concerning (i) data selection, i.e., which data sources to use; (ii) model selection, i.e., which machine learning model to adopt, and (iii) matching between the layers of the model and the available physical nodes. All these decisions influence each other, to a significant extent and often in counter-intuitive ways. In this paper, we formulate a problem addressing all of the above aspects and present a solution concept called RightTrain, aiming at making the aforementioned decisions in a joint manner, minimizing energy consumption subject to learning quality and latency constraints. RightTrain leverages an expanded-graph representation of the system and a delay-aware Steiner tree to obtain a provably near-optimal solution while keeping the time complexity low. Specifically, it runs in polynomial time and its decisions exhibit a competitive ratio of $2(1+ε)$, outperforming state-of-the-art solutions by over 50%. Our approach is also validated through a real-world implementation.
△ Less
Submitted 14 November, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Flexible Parallel Learning in Edge Scenarios: Communication, Computational and Energy Cost
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Traditionally, distributed machine learning takes the guise of (i) different nodes training the same model (as in federated learning), or (ii) one model being split among multiple nodes (as in distributed stochastic gradient descent). In this work, we highlight how fog- and IoT-based scenarios often require combining both approaches, and we present a framework for flexible parallel learning (FPL),…
▽ More
Traditionally, distributed machine learning takes the guise of (i) different nodes training the same model (as in federated learning), or (ii) one model being split among multiple nodes (as in distributed stochastic gradient descent). In this work, we highlight how fog- and IoT-based scenarios often require combining both approaches, and we present a framework for flexible parallel learning (FPL), achieving both data and model parallelism. Further, we investigate how different ways of distributing and parallelizing learning tasks across the participating nodes result in different computation, communication, and energy costs. Our experiments, carried out using state-of-the-art deep-network architectures and large-scale datasets, confirm that FPL allows for an excellent trade-off among computational (hence energy) cost, communication overhead, and learning performance.
△ Less
Submitted 18 January, 2022;
originally announced January 2022.
-
A Belief Propagation Solution for Beam Coordination in MmWave Vehicular Networks
Authors:
Zana Limani Fazliu,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Alessandro Nordio
Abstract:
Millimeter-wave communication is widely seen as a promising option to increase the capacity of vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Due to harsh propagation conditions, mmWave systems resort to narrow beams to serve their users, and such beams need to be configured according to traffic demand and its spatial dist…
▽ More
Millimeter-wave communication is widely seen as a promising option to increase the capacity of vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Due to harsh propagation conditions, mmWave systems resort to narrow beams to serve their users, and such beams need to be configured according to traffic demand and its spatial distribution, as well as interference. In this work, we address the beam management problem, considering an urban vehicular network composed of gNBs. We first build an accurate, yet tractable, system model and formulate an optimization problem aiming at maximizing the total network data rate while accounting for the stochastic nature of the network scenario. Then we develop a graph-based model capturing the main system characteristics and use it to develop a belief propagation algorithmic framework, called CRAB, that has low complexity and, hence, can effectively cope with large-scale scenarios. We assess the performance of our approach under real-world settings and show that, in comparison to state-of-the-art alternatives, CRAB provides on average a 50% improvement in the amount of data transferred by the single gNBs and up to 30% better user coverage.
△ Less
Submitted 23 June, 2022; v1 submitted 17 December, 2021;
originally announced December 2021.
-
Eavesdropping with Intelligent Reflective Surfaces: Threats and Defense Strategies
Authors:
Francesco Malandrino,
Alessandro Nordio,
Carla Fabiana Chiasserini
Abstract:
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communications security and privacy. In this work, we focus on this aspect and envision a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users. Unlike most of the existing works addressing passive eavesdro…
▽ More
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communications security and privacy. In this work, we focus on this aspect and envision a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users. Unlike most of the existing works addressing passive eavesdropping, the strategy we consider has low complexity and is suitable for scenarios where nodes are equipped with a limited number of antennas. Through our performance evaluation, we highlight the trade-off between the legitimate users' data rate and secrecy rate, and how the system parameters affect such a trade-off.
△ Less
Submitted 31 July, 2021;
originally announced August 2021.
-
Edge-powered Assisted Driving For Connected Cars
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gian Michele dell'Aera
Abstract:
Assisted driving for connected cars is one of the main applications that 5G-and-beyond networks shall support. In this work, we propose an assisted driving system leveraging the synergy between connected vehicles and the edge of the network infrastructure, in order to envision global traffic policies that can effectively drive local decisions. Local decisions concern individual vehicles, e.g., whi…
▽ More
Assisted driving for connected cars is one of the main applications that 5G-and-beyond networks shall support. In this work, we propose an assisted driving system leveraging the synergy between connected vehicles and the edge of the network infrastructure, in order to envision global traffic policies that can effectively drive local decisions. Local decisions concern individual vehicles, e.g., which vehicle should perform a lane-change manoeuvre and when; global decisions, instead, involve whole traffic flows. Such decisions are made at different time scales by different entities, which are integrated within an edge-based architecture and can share information. In particular, we leverage a queuing-based model and formulate an optimization problem to make global decisions on traffic flows. To cope with the problem complexity, we then develop an iterative, linear-time complexity algorithm called Bottleneck Hunting (BH). We show the performance of our solution using a realistic simulation framework, integrating a Python engine with ns-3 and SUMO, and considering two relevant services, namely, lane change assistance and navigation, in a real-world scenario. Results demonstrate that our solution leads to a reduction of the vehicles' travel times by 66 in the case of lane change assistance and by 20 for navigation, compared to traditional, local-coordination approaches.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Towards Node Liability in Federated Learning: Computational Cost and Network Overhead
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Many machine learning (ML) techniques suffer from the drawback that their output (e.g., a classification decision) is not clearly and intuitively connected to their input (e.g., an image). To cope with this issue, several explainable ML techniques have been proposed to, e.g., identify which pixels of an input image had the strongest influence on its classification. However, in distributed scenario…
▽ More
Many machine learning (ML) techniques suffer from the drawback that their output (e.g., a classification decision) is not clearly and intuitively connected to their input (e.g., an image). To cope with this issue, several explainable ML techniques have been proposed to, e.g., identify which pixels of an input image had the strongest influence on its classification. However, in distributed scenarios, it is often more important to connect decisions with the information used for the model training and the nodes supplying such information. To this end, in this paper we focus on federated learning and present a new methodology, named node liability in federated learning (NL-FL), which permits to identify the source of the training information that most contributed to a given decision. After discussing NL-FL's cost in terms of extra computation, storage, and network latency, we demonstrate its usefulness in an edge-based scenario. We find that NL-FL is able to swiftly identify misbehaving nodes and to exclude them from the training process, thereby improving learning accuracy.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
Optimization of IRS-aided Sub-THz Communications under practical design constraints
Authors:
Alberto Tarable,
Francesco Malandrino,
Laura Dossi,
Roberto Nebuloni,
Giuseppe Virone,
Alessandro Nordio
Abstract:
We consider the optimization of a smart radio environment where meta-surfaces are employed to improve the performance of multiuser wireless networks working at sub-THz frequencies. Motivated by the extreme sparsity of the THz channel we propose to model each meta-surface as an electronically steerable reflector, by using only two parameters, regardless of its size. This assumption, although subopt…
▽ More
We consider the optimization of a smart radio environment where meta-surfaces are employed to improve the performance of multiuser wireless networks working at sub-THz frequencies. Motivated by the extreme sparsity of the THz channel we propose to model each meta-surface as an electronically steerable reflector, by using only two parameters, regardless of its size. This assumption, although suboptimal in a general multiuser setup, allows for a significant complexity reduction when optimizing the environment and, despite its simplicity, is able to provide high communication rates. We derive a set of asymptotic results providing insight on the system behavior when both the number of antennas at the transmitter and the meta-surfaces area grow large. For the optimization we propose an algorithm based on the Newton-Raphson method and a simpler, yet effective, heuristic approach based on a map associating meta-surfaces and users. Through numerical results we provide insights on the system behavior and we assess the performance limits of the network in terms of supported users and spatial density of the meta-surfaces.
△ Less
Submitted 17 May, 2022; v1 submitted 21 June, 2021;
originally announced June 2021.
-
V-Edge: Virtual Edge Computing as an Enabler for Novel Microservices and Cooperative Computing
Authors:
Falko Dressler,
Carla Fabiana Chiasserini,
Frank H. P. Fitzek,
Holger Karl,
Renato Lo Cigno,
Antonio Capone,
Claudio Casetti,
Francesco Malandrino,
Vincenzo Mancuso,
Florian Klingler,
Gianluca Rizzo
Abstract:
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as p…
▽ More
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as proxy for the cloud. Yet this promising idea is hampered by the limited availability of such edge servers. In this paper, we discuss a way forward, namely the virtual edge computing (V-Edge) concept. V-Edge bridges the gap between cloud, edge, and fog by virtualizing all available resources including the end users' devices and making these resources widely available using well-defined interfaces. V-Edge also acts as an enabler for novel microservices as well as cooperative computing solutions. We introduce the general V-Edge architecture and we characterize some of the key research challenges to overcome, in order to enable wide-spread and even more powerful edge services.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Dynamic VNF Placement, Resource Allocation and Traffic Routing in 5G
Authors:
Morteza Golkarifard,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Ali Movaghar
Abstract:
5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accoun…
▽ More
5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accounting for the limited quantity of available resources and their cost. A critical challenge is that requests may be highly varying over time, requiring a solution that accounts for their dynamic generation and termination. With this motivation, we seek to make joint decisions for request admission, resource activation, VNF placement, resource allocation, and traffic routing. We do so by considering real-world aspects such as the setup times of virtual machines, with the goal of maximizing the mobile network operator profit. To this end, first, we formulate a one-shot optimization problem which can attain the optimum solution for small size problems given the complete knowledge of arrival and departure times of requests over the entire system lifespan. We then propose an efficient and practical heuristic solution that only requires this knowledge for the next time period and works for realistically-sized scenarios. Finally, we evaluate the performance of these solutions using real-world services and large-scale network topologies. {Results demonstrate that our heuristic solution performs better than a state-of-the-art online approach and close to the optimum.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Network Support for High-performance Distributed Machine Learning
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Nuria Molner,
Antonio De La Oliva
Abstract:
The traditional approach to distributed machine learning is to adapt learning algorithms to the network, e.g., reducing updates to curb overhead. Networks based on intelligent edge, instead, make it possible to follow the opposite approach, i.e., to define the logical network topology em around the learning task to perform, so as to meet the desired learning performance. In this paper, we propose…
▽ More
The traditional approach to distributed machine learning is to adapt learning algorithms to the network, e.g., reducing updates to curb overhead. Networks based on intelligent edge, instead, make it possible to follow the opposite approach, i.e., to define the logical network topology em around the learning task to perform, so as to meet the desired learning performance. In this paper, we propose a system model that captures such aspects in the context of supervised machine learning, accounting for both learning nodes (that perform computations) and information nodes (that provide data). We then formulate the problem of selecting (i) which learning and information nodes should cooperate to complete the learning task, and (ii) the number of iterations to perform, in order to minimize the learning cost while meeting the target prediction error and execution time. After proving important properties of the above problem, we devise an algorithm, named DoubleClimb, that can find a 1+1/|I|-competitive solution (with I being the set of information nodes), with cubic worst-case complexity. Our performance evaluation, leveraging a real-world network topology and considering both classification and regression tasks, also shows that DoubleClimb closely matches the optimum, outperforming state-of-the-art alternatives.
△ Less
Submitted 5 July, 2022; v1 submitted 5 February, 2021;
originally announced February 2021.
-
Federated Learning at the Network Edge: When Not All Nodes are Created Equal
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Under the federated learning paradigm, a set of nodes can cooperatively train a machine learning model with the help of a centralized server. Such a server is also tasked with assigning a weight to the information received from each node, and often also to drop too-slow nodes from the learning process. Both decisions have major impact on the resulting learning performance, and can interfere with e…
▽ More
Under the federated learning paradigm, a set of nodes can cooperatively train a machine learning model with the help of a centralized server. Such a server is also tasked with assigning a weight to the information received from each node, and often also to drop too-slow nodes from the learning process. Both decisions have major impact on the resulting learning performance, and can interfere with each other in counterintuitive ways. In this paper, we focus on edge networking scenarios and investigate existing and novel approaches to such model-weighting and node-dropping decisions. Leveraging a set of real-world experiments, we find that popular, straightforward decision-making approaches may yield poor performance, and that considering the quality of data in addition to its quantity can substantially improve learning.
△ Less
Submitted 3 February, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
Scheduling of Emergency Tasks for Multiservice UAVs in Post-Disaster Scenarios
Authors:
Cristina Rottondi,
Francesco Malandrino,
Andrea Bianco,
Carla Fabiana Chiasserini,
Ioannis Stavrakakis
Abstract:
Single-task UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication support, and other specific tasks. When the geographical area of operation of single-task missions is common, e.g., in post-disaster recovery scenarios, it is more efficient to have multiple tasks carried out as part of a single UAV mission. In these scenarios, the UAVs' equipment and mission…
▽ More
Single-task UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication support, and other specific tasks. When the geographical area of operation of single-task missions is common, e.g., in post-disaster recovery scenarios, it is more efficient to have multiple tasks carried out as part of a single UAV mission. In these scenarios, the UAVs' equipment and mission plan must be carefully selected to minimize the carried load and overall resource consumption. In this paper, we investigate the joint planning of multitask missions leveraging a fleet of UAVs equipped with a standard set of accessories enabling heterogeneous tasks. To this end, an optimization problem is formulated yielding the optimal joint planning and deriving the resulting quality of the delivered tasks. In addition, two heuristic solutions are developed for large-scale environments to cope with the increased complexity of the optimization framework. The joint planning is applied to a specific scenario of a flood in the San Francisco area. Results show the effectiveness of the proposed heuristic solutions, which provide good performance and allow for drastic savings in the computational time required to plan the UAVs' trajectories with respect to the optimal approach, thus enabling prompt reaction to the emergency events.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
An Edge-powered Approach to Assisted Driving
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gian Michele Dell'Aera
Abstract:
Automotive services for connected vehicles are one of the main fields of application for new-generation mobile networks as well as for the edge computing paradigm. In this paper, we investigate a system architecture that integrates the distributed vehicular network with the network edge, with the aim to optimize the vehicle travel times. We then present a queue-based system model that permits the…
▽ More
Automotive services for connected vehicles are one of the main fields of application for new-generation mobile networks as well as for the edge computing paradigm. In this paper, we investigate a system architecture that integrates the distributed vehicular network with the network edge, with the aim to optimize the vehicle travel times. We then present a queue-based system model that permits the optimization of the vehicle flows, and we show its applicability to two relevant services, namely, lane change/merge (representative of cooperative assisted driving) and navigation. Furthermore, we introduce an efficient algorithm called Bottleneck Hunting (BH), able to formulate high-quality flow policies in linear time. We assess the performance of the proposed system architecture and of BH through a comprehensive and realistic simulation framework, combining ns-3 and SUMO. The results, derived under real-world scenarios, show that our solution provides much shorter travel times than when decisions are made by individual vehicles.
△ Less
Submitted 21 August, 2020;
originally announced August 2020.
-
Graph-based Model for Beam Management in Mmwave Vehicular Networks
Authors:
Zana Limani Fazliu,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Alessandro Nordio
Abstract:
Mmwave bands are being widely touted as a very promising option for future 5G networks, especially in enabling such networks to meet highly demanding rate requirements. Accordingly, the usage of these bands is also receiving an increasing interest in the context of 5G vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Mmwave c…
▽ More
Mmwave bands are being widely touted as a very promising option for future 5G networks, especially in enabling such networks to meet highly demanding rate requirements. Accordingly, the usage of these bands is also receiving an increasing interest in the context of 5G vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Mmwave communications, however, require the link to be established using narrow directed beams, to overcome harsh propagation conditions. The advanced antenna systems enabling this also allow for a complex beam design at the base station, where multiple beams of different widths can be set up. In this work, we focus on beam management in an urban vehicular network, using a graph-based approach to model the system characteristics and the existing constraints. In particular, unlike previous work, we formulate the beam design problem as a maximum-weight matching problem on a bipartite graph with conflicts, and then we solve it using an efficient heuristic algorithm. Our results show that our approach easily outperforms advanced methods based on clustering algorithms.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
Mmwave Beam Management in Urban Vehicular Networks
Authors:
Zana Limani,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Alessandro Nordio
Abstract:
Millimeter-wave (mmwave) communication represents a potential solution to capacity shortage in vehicular networks. However, effective beam alignment between senders and receivers requires accurate knowledge of the vehicles' position for fast beam steering, which is often impractical to obtain in real time. We address this problem by leveraging the traffic signals regulating vehicular mobility: as…
▽ More
Millimeter-wave (mmwave) communication represents a potential solution to capacity shortage in vehicular networks. However, effective beam alignment between senders and receivers requires accurate knowledge of the vehicles' position for fast beam steering, which is often impractical to obtain in real time. We address this problem by leveraging the traffic signals regulating vehicular mobility: as an example, we may coordinate beams with red traffic lights, as they correspond to higher vehicle densities and lower speeds. To evaluate our intuition, we propose a tractable, yet accurate, mmwave communication model accounting for both the distance and the heading of vehicles being served. Using such a model, we optimize the beam design and define a low-complexity, heuristic strategy. For increased realism, we consider as reference scenario a large-scale, real-world mobility trace of vehicles in Luxembourg. The results show that our approach closely matches the optimum and always outperforms static beam design based on road topology alone. Remarkably, it also yields better performance than solutions based on real-time mobility information.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Active Learning-based Classification in Automated Connected Vehicles
Authors:
Alaa Awad Abdellatif,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Machine learning has emerged as a promising paradigm for enabling connected, automated vehicles to autonomously cruise the streets and react to unexpected situations. A key challenge, however, is to collect and select real-time and reliable information for the correct classification of unexpected, and often rare, situations that may happen on the road. Indeed, the data generated by vehicles, or re…
▽ More
Machine learning has emerged as a promising paradigm for enabling connected, automated vehicles to autonomously cruise the streets and react to unexpected situations. A key challenge, however, is to collect and select real-time and reliable information for the correct classification of unexpected, and often rare, situations that may happen on the road. Indeed, the data generated by vehicles, or received from neighboring vehicles, may be affected by errors or have different levels of resolution and freshness. To tackle this challenge, we propose an active learning framework that, leveraging the information collected through onboard sensors as well as received from other vehicles, effectively deals with scarce and noisy data. In particular, given the available information, our solution selects the data to add to the training set by trading off between two essential features, namely, quality and diversity. The results, obtained using real-world data sets, show that the proposed method significantly outperforms state-of-the-art solutions, providing high classification accuracy at the cost of a limited bandwidth requirement for the data exchange between vehicles.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Characterizing Delay and Control Traffic of the Cellular MME with IoT Support
Authors:
Christian Vitale,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Senay Semu Tadesse
Abstract:
One of the main use cases for advanced cellular networks is represented by massive Internet-of-things (MIoT), i.e., an enormous number of IoT devices that transmit data toward the cellular network infrastructure. To make cellular MIoT a reality, data transfer and control procedures specifically designed for the support of IoT are needed. For this reason, 3GPP has introduced the Control Plane Cellu…
▽ More
One of the main use cases for advanced cellular networks is represented by massive Internet-of-things (MIoT), i.e., an enormous number of IoT devices that transmit data toward the cellular network infrastructure. To make cellular MIoT a reality, data transfer and control procedures specifically designed for the support of IoT are needed. For this reason, 3GPP has introduced the Control Plane Cellular IoT optimization, which foresees a simplified bearer instantiation, with the Mobility Management Entity (MME) handling both control and data traffic. The performance of the MME has therefore become critical, and properly scaling its computational capability can determine the ability of the whole network to tackle MIoT effectively. In particular, considering virtualized networks and the need for an efficient allocation of computing resources, it is paramount to characterize the MME performance as the MIoT traffic load changes. We address this need by presenting compact, closed-form expressions linking the number of IoT sources with the rate at which bearers are requested, and such a rate with the delay incurred by the IoT data. We show that our analysis, supported by testbed experiments and verified through large-scale simulations, represents a valuable tool to make effective scaling decisions in virtualized cellular core networks.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
OKpi: All-KPI Network Slicing Through Efficient Resource Allocation
Authors:
Jorge {Martín-Pérez},
Francesco Malandrino,
Carla Fabiana Chiasserini,
Carlos J. Bernardos
Abstract:
Networks can now process data as well as transporting it; it follows that they can support multiple services, each requiring different key performance indicators (KPIs). Because of the former, it is critical to efficiently allocate network and computing resources to provide the required services, and, because of the latter, such decisions must jointly consider all KPIs targeted by a service. Accou…
▽ More
Networks can now process data as well as transporting it; it follows that they can support multiple services, each requiring different key performance indicators (KPIs). Because of the former, it is critical to efficiently allocate network and computing resources to provide the required services, and, because of the latter, such decisions must jointly consider all KPIs targeted by a service. Accounting for newly introduced KPIs (e.g., availability and reliability) requires tailored models and solution strategies, and has been conspicuously neglected by existing works, which are instead built around traditional metrics like throughput and latency. We fill this gap by presenting a novel methodology and resource allocation scheme, named OKpi, which enables high-quality selection of radio points of access as well as VNF (Virtual Network Function) placement and data routing, with polynomial computational complexity. OKpi accounts for all relevant KPIs required by each service, and for any available resource from the fog to the cloud. We prove several important properties of OKpi and evaluate its performance in two real-world scenarios, finding it to closely match the optimum.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Edge-Based Collision Avoidance for Vehicles and Vulnerable Users: An Architecture Based on MEC
Authors:
Marco Malinverno,
Giuseppe Avino,
Claudio Casetti,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Salvatore Scarpina
Abstract:
Collision avoidance is one of the most promising applications for vehicular networks, dramatically improving the safety of the vehicles that support it. In this paper, we investigate how it can be extended to benefit vulnerable users, e.g., pedestrians and bicycles, equipped with a smartphone. We argue that, owing to the reduced capabilities of smartphones compared to vehicular on-board units, tra…
▽ More
Collision avoidance is one of the most promising applications for vehicular networks, dramatically improving the safety of the vehicles that support it. In this paper, we investigate how it can be extended to benefit vulnerable users, e.g., pedestrians and bicycles, equipped with a smartphone. We argue that, owing to the reduced capabilities of smartphones compared to vehicular on-board units, traditional distributed approaches are not viable, and that multi-access edge computing (MEC) support is needed. Thus, we propose a MEC-based collision avoidance system, discussing its architecture and evaluating its performance. We find that, thanks to MEC, we are able to extend the protection of collision avoidance, traditionally thought for vehicles, to vulnerable users without impacting its effectiveness or latency.
△ Less
Submitted 6 January, 2021; v1 submitted 13 November, 2019;
originally announced November 2019.
-
Reducing Service Deployment Cost Through VNF Sharing
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gil Einziger,
Gabriel Scalosub
Abstract:
Thanks to its computational and forwarding capabilities, the mobile network infrastructure can support several third-party ("vertical") services, each composed of a graph of virtual (network) functions (VNFs). Importantly, one or more VNFs are often common to multiple services, thus the services deployment cost could be reduced by letting the services share the same VNF instance instead of devotin…
▽ More
Thanks to its computational and forwarding capabilities, the mobile network infrastructure can support several third-party ("vertical") services, each composed of a graph of virtual (network) functions (VNFs). Importantly, one or more VNFs are often common to multiple services, thus the services deployment cost could be reduced by letting the services share the same VNF instance instead of devoting a separate instance to each service. By doing that, however, it is critical that the target KPI (key performance indicators) of all services are met. To this end, we study the VNF sharing problem and make decisions on (i) when sharing VNFs among multiple services is possible, (ii) how to adapt the virtual machines running the shared VNFs to the combined load of the assigned services, and (iii) how to prioritize the services traffic within shared VNFs. All decisions aim to minimize the cost for the mobile operator, subject to requirements on end-to-end service performance, e.g., total delay. Notably, we show that the aforementioned priorities should be managed dynamically and vary across VNFs. We then propose the FlexShare algorithm to provide near-optimal VNF-sharing and priority assignment decisions in polynomial time. We prove that FlexShare is within a constant factor from the optimum and, using real-world VNF graphs, we show that it consistently outperforms baseline solutions.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
An Optimization-enhanced MANO for Energy-efficient 5G Networks
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Claudio Casetti,
Giada Landi,
Marco Capitani
Abstract:
5G network nodes, fronthaul and backhaul alike, will have both forwarding and computational capabilities. This makes energy-efficient network management more challenging, as decisions such as activating or deactivating a node impact on both the ability of the network to route traffic and the amount of processing it can perform. To this end, we formulate an optimization problem accounting for the m…
▽ More
5G network nodes, fronthaul and backhaul alike, will have both forwarding and computational capabilities. This makes energy-efficient network management more challenging, as decisions such as activating or deactivating a node impact on both the ability of the network to route traffic and the amount of processing it can perform. To this end, we formulate an optimization problem accounting for the main features of 5G nodes and the traffic they serve, allowing joint decisions about (i) the nodes to activate, (ii) the network functions they run, and (iii) the traffic routing. Our optimization module is integrated within the management and orchestration framework of 5G, thus enabling swift and high-quality decisions. We test our scheme with both a real-world testbed based on OpenStack and OpenDaylight, and a large-scale emulated network whose topology and traffic come from a real-world mobile operator, finding it to consistently outperform state-of-the art alternatives and closely match the optimum.
△ Less
Submitted 23 July, 2019;
originally announced July 2019.
-
Service Shifting: a Paradigm for Service Resilience in 5G
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Giada Landi
Abstract:
Many real-world services can be provided through multiple virtual network function (VNF) graphs, corresponding, e.g., to high- and low-complexity variants of the service itself. Based on this observation, we extend the concept of service scaling in network orchestration to service shifting, i.e., upgrading or downgrading the VNF graph to use among those implementing the same service. Service shift…
▽ More
Many real-world services can be provided through multiple virtual network function (VNF) graphs, corresponding, e.g., to high- and low-complexity variants of the service itself. Based on this observation, we extend the concept of service scaling in network orchestration to service shifting, i.e., upgrading or downgrading the VNF graph to use among those implementing the same service. Service shifting can serve multiple goals, from reducing operational costs to reacting to infrastructure problems. Furthermore, it enhances the flexibility of service-level agreements between network operators and third party content providers ("verticals). In this paper, we introduce and describe the service shifting concept, its benefits, and the associated challenges, with special reference to how service shifting can be integrated within real-world 5G architectures and implementations. We conclude that existing network orchestration frameworks can be easily extended to support service shifting, and its adoption has the potential to make 5G network slices easier for the operators to manage under high-load conditions, while still meeting the verticals' requirements.
△ Less
Submitted 24 May, 2019;
originally announced May 2019.
-
Multiservice UAVs for Emergency Tasks in Post-disaster Scenarios
Authors:
Francesco Malandrino,
Cristina Rottondi,
Carla-Fabiana Chiasserini,
Andrea Bianco,
Ioannis Stavrakakis
Abstract:
UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication-support and other specific tasks. Their equipment and mission plan are carefully selected to minimize the carried load an overall resource consumption. Typically, several single task UAVs are dispatched to perform different missions. In certain cases, (part of) the geographical area of operation may be c…
▽ More
UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication-support and other specific tasks. Their equipment and mission plan are carefully selected to minimize the carried load an overall resource consumption. Typically, several single task UAVs are dispatched to perform different missions. In certain cases, (part of) the geographical area of operation may be common to these single task missions (such as those supporting post-disaster recovery) and it may be more efficient to have multiple tasks carried out as part of a single UAV mission using common or even additional specialized equipment.
In this paper, we propose and investigate a joint planning of multitask missions leveraging a fleet of UAVs equipped with a standard set of accessories enabling heterogeneous tasks. To this end, an optimization problem is formulated yielding the optimal joint planning and deriving the resulting quality of the delivered tasks. In addition, a heuristic solution is developed for large-scale environments to cope with the increased complexity of the optimization framework. The developed joint planning of multitask missions is applied to a specific post-disaster recovery scenario of a flooding in the San Francisco area. The results show the effectiveness of the proposed solutions and the potential savings in the number of UAVs needed to carry out all the tasks with the required level of quality.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
Getting the Most Out of Your VNFs: Flexible Assignment of Service Priorities in 5G
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini
Abstract:
Through their computational and forwarding capabilities, 5G networks can support multiple vertical services. Such services may include several common virtual (network) functions (VNFs), which could be shared to increase resource efficiency. In this paper, we focus on the seldom studied VNF-sharing problem, and decide (i) whether sharing a VNF instance is possible/beneficial or not, (ii) how to sca…
▽ More
Through their computational and forwarding capabilities, 5G networks can support multiple vertical services. Such services may include several common virtual (network) functions (VNFs), which could be shared to increase resource efficiency. In this paper, we focus on the seldom studied VNF-sharing problem, and decide (i) whether sharing a VNF instance is possible/beneficial or not, (ii) how to scale virtual machines hosting the VNFs to share, and (iii) the priorities of the different services sharing the same VNF. These decisions are made with the aim to minimize the mobile operator's costs while meeting the verticals' performance requirements. Importantly, we show that the aforementioned priorities should not be determined a priori on a per-service basis, rather they should change across VNFs since such additional flexibility allows for more efficient solutions. We then present an effective methodology called FlexShare, enabling near-optimal VNF-sharing decisions in polynomial time. Our performance evaluation, using real-world VNF graphs, confirms the effectiveness of our approach, which consistently outperforms baseline solutions using per-service priorities.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Towards Failure Resiliency in 5G: Service Shifting
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Giada Landi
Abstract:
Many real-world services can be provided through multiple VNF graphs, corresponding, e.g., to high- and low-quality variants of the service itself. Based on this observation, we extend the concept of service scaling in network orchestration to service shifting, i.e., switching between the VNF graphs implementing the same service. Service shifting can serve multiple goals, from reducing operational…
▽ More
Many real-world services can be provided through multiple VNF graphs, corresponding, e.g., to high- and low-quality variants of the service itself. Based on this observation, we extend the concept of service scaling in network orchestration to service shifting, i.e., switching between the VNF graphs implementing the same service. Service shifting can serve multiple goals, from reducing operational costs to reacting to infrastructure problems. Furthermore, it enhances the flexibility of service-level agreements between network operators and third party content providers ("verticals"). In this paper, we introduce and describe the service shifting concept, its benefits, and the associated challenges, with special reference to how service shifting can be integrated within real-world 5G architectures and implementations. We conclude that existing network orchestration frameworks can be easily extended to support service shifting, and its adoption has the potential to make 5G network slices easier for the operators to manage under high-load conditions, while still meeting the verticals' requirements.
△ Less
Submitted 17 February, 2019;
originally announced February 2019.
-
5G Traffic Forecasting: If Verticals and Mobile Operators Cooperate
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
In 5G research, it is traditionally assumed that vertical industries (a.k.a verticals) set the performance requirements for the services they want to offer to mobile users, and the mobile operators alone are in charge of orchestrating their resources so as to meet such requirements. Motivated by the observation that successful orchestration requires reliable traffic predictions, in this paper we i…
▽ More
In 5G research, it is traditionally assumed that vertical industries (a.k.a verticals) set the performance requirements for the services they want to offer to mobile users, and the mobile operators alone are in charge of orchestrating their resources so as to meet such requirements. Motivated by the observation that successful orchestration requires reliable traffic predictions, in this paper we investigate the effects of having the verticals, instead of the mobile operators, performing such predictions. Leveraging a real-world, large-scale, crowd-sourced trace, we find that involving the verticals in the prediction process reduces the prediction errors and improves the quality of the resulting orchestration decisions.
△ Less
Submitted 1 January, 2019;
originally announced January 2019.
-
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks
Authors:
Satyam Agarwal,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Swades De
Abstract:
One of the main goals of 5G networks is to support the technological and business needs of various industries (the so-called verticals), which wish to offer to their customers a wide range of services characterized by diverse performance requirements. In this context, a critical challenge lies in mapping in an automated manner the requirements of verticals into decisions concerning the network inf…
▽ More
One of the main goals of 5G networks is to support the technological and business needs of various industries (the so-called verticals), which wish to offer to their customers a wide range of services characterized by diverse performance requirements. In this context, a critical challenge lies in mapping in an automated manner the requirements of verticals into decisions concerning the network infrastructure, including VNF placement, resource assignment, and traffic routing. In this paper, we seek to make such decisions jointly, accounting for their mutual interaction, and efficiently. To this end, we formulate a queuing-based model and use it at the network orchestrator to optimally match the vertical's requirements to the available system resources. We then propose a fast and efficient solution strategy, called MaxZ, which allows us to reduce the solution complexity. Our performance evaluation, carried out accounting for multiple scenarios representative of real-world services, shows that MaxZ performs substantially better than state-of-the-art alternatives and consistently close to the optimum.
△ Less
Submitted 29 December, 2018;
originally announced December 2018.
-
Planning UAV Activities for Efficient User Coverage in Disaster Areas
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Claudio Casetti,
Luca Chiaraviglio,
Andrea Senacheribbe
Abstract:
Climate changes brought about by global warming as well as man-made environmental changes are often the cause of sever natural disasters. ICT, which is itself responsible for global warming due to its high carbon footprint, can play a role in alleviating the consequences of such hazards by providing reliable, resilient means of communication during a disaster crisis. In this paper, we explore the…
▽ More
Climate changes brought about by global warming as well as man-made environmental changes are often the cause of sever natural disasters. ICT, which is itself responsible for global warming due to its high carbon footprint, can play a role in alleviating the consequences of such hazards by providing reliable, resilient means of communication during a disaster crisis. In this paper, we explore the provision of wireless coverage through UAVs (Unmanned Aerial Vehicles) to complement, or replace, the traditional communication infrastructure. The use of UAVs is indeed crucial in emergency scenarios, as they allow for the quick and easy deployment of micro and pico cellular base stations where needed. We characterize the movements of UAVs and define an optimization problem to determine the best UAV coverage that maximizes the user throughput, while maintaining fairness across the different parts of the geographical area that has been affected by the disaster. To evaluate our strategy, we simulate a flooding in San Francisco and the car traffic resulting from people seeking safety on higher ground.
△ Less
Submitted 3 April, 2019; v1 submitted 29 November, 2018;
originally announced November 2018.
-
From Megabits to CPU~Ticks: Enriching a Demand Trace in the Age of MEC
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Giuseppe Avino,
Marco Malinverno,
Scott Kirkpatrick
Abstract:
All the content consumed by mobile users, be it a web page or a live stream, undergoes some processing along the way; as an example, web pages and videos are transcoded to fit each device's screen. The recent multi-access edge computing (MEC) paradigm envisions performing such processing within the cellular network, as opposed to resorting to a cloud server on the Internet. Designing a MEC network…
▽ More
All the content consumed by mobile users, be it a web page or a live stream, undergoes some processing along the way; as an example, web pages and videos are transcoded to fit each device's screen. The recent multi-access edge computing (MEC) paradigm envisions performing such processing within the cellular network, as opposed to resorting to a cloud server on the Internet. Designing a MEC network, i.e., placing and dimensioning the computational facilities therein, requires information on how much computational power is required to produce the contents needed by the users. However, real-world demand traces only contain information on how much data is downloaded. In this paper, we demonstrate how to {\em enrich} demand traces with information about the computational power needed to process the different types of content, and we show the substantial benefit that can be obtained from using such enriched traces for the design of MEC-based networks.
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
Characterizing the Power Cost of Virtualization Environments
Authors:
Senay Semu Tadesse,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Virtualization is a key building block of next-generation mobile networks. It can be implemented through two main approaches: traditional virtual machines and lighter-weight containers. Our objective in this paper is to compare these approaches and study the power consumption they are associated with. To this end, we perform a large set of real-world measurements, using both synthetic workloads an…
▽ More
Virtualization is a key building block of next-generation mobile networks. It can be implemented through two main approaches: traditional virtual machines and lighter-weight containers. Our objective in this paper is to compare these approaches and study the power consumption they are associated with. To this end, we perform a large set of real-world measurements, using both synthetic workloads and real-world applications, and use them to model the relationship between the resource usage of the hosted application and the power consumption of both virtual machines and containers hosting it. We find that containers incur substantially lower power consumption than virtual machines, and that such consumption increases more slowly with the application load.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Resource Orchestration of 5G Transport Networks for Vertical Industries
Authors:
K. Antevski,
J. Martín-Pérez,
Nuria Molner,
C. F. Chiasserini,
F. Malandrino,
P. Frangoudis,
A. Ksentini,
X. Li,
J. SalvatLozano,
R. Martínez,
I. Pascual,
J. Mangues-Bafalluy,
J. Baranda,
B. Martini,
M. Gharbaoui
Abstract:
The future 5G transport networks are envisioned to support a variety of vertical services through network slicing and efficient orchestration over multiple administrative domains. In this paper, we propose an orchestrator architecture to support vertical services to meet their diverse resource and service requirements. We then present a system model for resource orchestration of transport networks…
▽ More
The future 5G transport networks are envisioned to support a variety of vertical services through network slicing and efficient orchestration over multiple administrative domains. In this paper, we propose an orchestrator architecture to support vertical services to meet their diverse resource and service requirements. We then present a system model for resource orchestration of transport networks as well as low-complexity algorithms that aim at minimizing service deployment cost and/or service latency. Importantly, the proposed model can work with any level of abstractions exposed by the underlying network or the federated domains depending on their representation of resources.
△ Less
Submitted 27 July, 2018;
originally announced July 2018.
-
Mining the Air -- for Research in Social Science and Networking Measurement
Authors:
Scott Kirkpatrick,
Ron Bekkerman,
Adi Zmirli,
Francesco Malandrino
Abstract:
Smartphone apps provide a vitally important opportunity for monitoring human mobility, human experience of ubiquitous information aids, and human activity in our increasingly well-instrumented spaces. As wireless data capabilities move steadily up in performance, from 2&3G to 4G (today's LTE) and 5G, it has become more important to measure human activity in this connected world from the phones the…
▽ More
Smartphone apps provide a vitally important opportunity for monitoring human mobility, human experience of ubiquitous information aids, and human activity in our increasingly well-instrumented spaces. As wireless data capabilities move steadily up in performance, from 2&3G to 4G (today's LTE) and 5G, it has become more important to measure human activity in this connected world from the phones themselves. The newer protocols serve larger areas than ever before and a wider range of data, not just voice calls, so only the phone can accurately measure its location. Access to the application activity permits not only monitoring the performance and spatial coverage with which the users are served, but as a crowd-sourced, unbiased background source of input on all these subjects, becomes a uniquely valuable resource for input to social science and government as well as telecom providers
△ Less
Submitted 19 June, 2018;
originally announced June 2018.
-
Area formation and content assignment for LTE broadcasting
Authors:
Claudio Casetti,
Carla-Fabiana Chiasserini,
Francesco Malandrino,
Carlo Borgiattino
Abstract:
Broadcasting and multicasting services in LTE networks are shaping up to be an effective way to provide popular content. A key requirement is that cells are aggregated into areas where a tight time synchronization among transmissions is enforced, so as to broadcast the same radio resources. Our paper addresses a facet of LTE broadcasting that has so far received little attention: the creation of b…
▽ More
Broadcasting and multicasting services in LTE networks are shaping up to be an effective way to provide popular content. A key requirement is that cells are aggregated into areas where a tight time synchronization among transmissions is enforced, so as to broadcast the same radio resources. Our paper addresses a facet of LTE broadcasting that has so far received little attention: the creation of broadcasting areas and the assignment of content to them in order to efficiently exploit radio resources and satisfy user requests. Our original clustering approach, named Single-Content Fusion, achieves these goals by initially aggregating cells into single-content areas and maximizing cell similarity in content interests. Aggregated areas are then merged into multiple-content areas by virtue of similar spatial coverage. We show the validity of our solution pointing out the advantages it provides in comparison to other approaches. We also discuss the impact of various system factors (e.g., number of served users, broadcast data rate, area size) and the scalability of our proposal in large, realistic scenarios with both static and time-varying user interest.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Optimization-in-the-Loop for Energy-Efficient 5G
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Claudio E. Casetti,
Giada Landi
Abstract:
We consider the problem of energy-efficient network management in 5G systems, where backhaul and fronthaul nodes have both networking and computational capabilities. We devise an optimization model accounting for the main features of 5G backhaul and fronthaul, and jointly solve the problems of (i) node switch on/off, (ii) VNF placement, and (iii) traffic routing. We implement an optimization modul…
▽ More
We consider the problem of energy-efficient network management in 5G systems, where backhaul and fronthaul nodes have both networking and computational capabilities. We devise an optimization model accounting for the main features of 5G backhaul and fronthaul, and jointly solve the problems of (i) node switch on/off, (ii) VNF placement, and (iii) traffic routing. We implement an optimization module within an application on top of an SDN controller and NFV orchestrator, thus enabling swift, high-quality decisions based on current network conditions. Finally, we validate and test our scheme with real-world power consumption, network topology and traffic demand, assessing its performance as well as the relative importance of the main contributions to the total power consumption of the system.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Cellular Network Traces Towards 5G: Usage, Analysis and Generation
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Scott Kirkpatrick
Abstract:
Deployment and demand traces are a crucial tool to study today's LTE systems, as well as their evolution toward 5G. In this paper, we use a set of real-world, crowdsourced traces, coming from the WeFi and OpenSignal apps, to investigate how present-day networks are deployed, and the load they serve. Given this information, we present a way to generate synthetic deployment and demand profiles, reta…
▽ More
Deployment and demand traces are a crucial tool to study today's LTE systems, as well as their evolution toward 5G. In this paper, we use a set of real-world, crowdsourced traces, coming from the WeFi and OpenSignal apps, to investigate how present-day networks are deployed, and the load they serve. Given this information, we present a way to generate synthetic deployment and demand profiles, retaining the same features of their real-world counterparts. We further discuss a methodology using traces (both real-world and synthetic) to assess (i) to which extent the current deployment is adequate to the current and future demand, and (ii) the effectiveness of the existing strategies to improve network capacity. Applying our methodology to real-world traces, we find that present-day LTE deployments consist of multiple, entangled, medium- to large-sized cells. Furthermore, although today's LTE networks are overprovisioned when compared to the present traffic demand, they will need substantial capacity improvements in order to face the load increase forecasted between now and 2020.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Scheduling Advertisement Delivery in Vehicular Networks
Authors:
Gil Einziger,
Carla-Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Vehicular users are emerging as a prime market for targeted advertisement, where advertisements (ads) are sent from network points of access to vehicles, and displayed to passengers only if they are relevant to them. In this study, we take the viewpoint of a broker managing the advertisement system, and getting paid every time a relevant ad is displayed to an interested user. The broker selects th…
▽ More
Vehicular users are emerging as a prime market for targeted advertisement, where advertisements (ads) are sent from network points of access to vehicles, and displayed to passengers only if they are relevant to them. In this study, we take the viewpoint of a broker managing the advertisement system, and getting paid every time a relevant ad is displayed to an interested user. The broker selects the ads to broadcast at each point of access so as to maximize its revenue. In this context, we observe that choosing the ads that best fit the users' interest could actually hurt the broker's revenue. In light of this conflict, we present Volfied, an algorithm allowing for conflict-free, near-optimal ad selection with very low computational complexity. Our performance evaluation, carried out through real-world vehicular traces, shows that Volfied increases the broker revenue by up to 70% with provably low computational complexity, compared to state-of-the-art alternatives.
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Performance Analysis of C-V2I-based Automotive Collision Avoidance
Authors:
Marco Malinverno,
Giuseppe Avino,
Francesco Malandrino,
Claudio Casetti,
Carla-Fabiana Chiasserini,
Salvatore Scarpina
Abstract:
One of the key applications envisioned for C-V2I (Cellular Vehicle-to-Infrastructure) networks pertains to safety on the road. Thanks to the exchange of Cooperative Awareness Messages (CAMs), vehicles and other road users (e.g., pedestrians) can advertise their position, heading and speed and sophisticated algorithms can detect potentially dangerous situations leading to a crash. In this paper, we…
▽ More
One of the key applications envisioned for C-V2I (Cellular Vehicle-to-Infrastructure) networks pertains to safety on the road. Thanks to the exchange of Cooperative Awareness Messages (CAMs), vehicles and other road users (e.g., pedestrians) can advertise their position, heading and speed and sophisticated algorithms can detect potentially dangerous situations leading to a crash. In this paper, we focus on the safety application for automotive collision avoidance at intersections, and study the effectiveness of its deployment in a C-V2I-based infrastructure. In our study, we also account for the location of the server running the application as a factor in the system design. Our simulation-based results, derived in real-world scenarios, provide indication on the reliability of algorithms for car-to-car and car-to-pedestrian collision avoidance, both when a human driver is considered and when automated vehicles (with faster reaction times) populate the streets.
△ Less
Submitted 23 March, 2018;
originally announced March 2018.
-
Characterizing Docker Overhead in Mobile Edge Computing Scenarios
Authors:
Giuseppe Avino,
Marco Malinverno,
Francesco Malandrino,
Claudio Casetti,
Carla-Fabiana Chiasserini
Abstract:
Mobile Edge Computing (MEC) is an emerging network paradigm that provides cloud and IT services at the point of access of the network. Such proximity to the end user translates into ultra-low latency and high bandwidth, while, at the same time, it alleviates traffic congestion in the network core. Due to the need to run servers on edge nodes (e.g., an LTE-A macro eNodeB), a key element of MEC arch…
▽ More
Mobile Edge Computing (MEC) is an emerging network paradigm that provides cloud and IT services at the point of access of the network. Such proximity to the end user translates into ultra-low latency and high bandwidth, while, at the same time, it alleviates traffic congestion in the network core. Due to the need to run servers on edge nodes (e.g., an LTE-A macro eNodeB), a key element of MEC architectures is to ensure server portability and low overhead. A possible tool that can be used for this purpose is Docker, a framework that allows easy, fast deployment of Linux containers. This paper addresses the suitability of Docker in MEC scenar- ios by quantifying the CPU consumed by Docker when running two different containerized services: multiplayer gam- ing and video streaming. Our tests, run with varying numbers of clients and servers, yield different results for the two case studies: for the gaming service, the overhead logged by Docker increases only with the number of servers; con- versely, for the video streaming case, the overhead is not affected by the number of either clients or servers.
△ Less
Submitted 26 January, 2018;
originally announced January 2018.
-
Virtualization-based Evaluation of Backhaul Performance in Vehicular Applications
Authors:
Francesco Malandrino,
Carla-Fabiana Chiasserini,
Claudio Casetti
Abstract:
Next-generation networks, based on SDN and NFV, are expected to support a wide array of services, including vehicular safety applications. These services come with strict delay constraints, and our goal in this paper is to ascertain to which extent SDN/NFV-based networks are able to meet them. To this end, we build and emulate a vehicular collision detection system, using the popular Mininet and D…
▽ More
Next-generation networks, based on SDN and NFV, are expected to support a wide array of services, including vehicular safety applications. These services come with strict delay constraints, and our goal in this paper is to ascertain to which extent SDN/NFV-based networks are able to meet them. To this end, we build and emulate a vehicular collision detection system, using the popular Mininet and Docker tools, on a real-world topology with mobility information. Using different core network topologies and open-source SDN controllers, we measure (i) the delay with which vehicle beacons are processed and (ii) the associated overhead and energy consumption. We find that we can indeed meet the latency constraints associated with vehicular safety applications, and that SDN controllers represent a moderate contribution to the overall energy consumption but a significant source of additional delay.
△ Less
Submitted 22 January, 2018;
originally announced January 2018.