-
Communicating Smartly in Molecular Communication Environments: Neural Networks in the Internet of Bio-Nano Things
Authors:
Jorge Torres Gómez,
Pit Hofmann,
Lisa Y. Debus,
Osman Tugay Başaran,
Sebastian Lotter,
Roya Khanzadeh,
Stefan Angerbauer,
Bige Deniz Unluturk,
Sergi Abadal,
Werner Haselmayr,
Frank H. P. Fitzek,
Robert Schober,
Falko Dressler
Abstract:
Recent developments in the Internet of Bio-Nano Things (IoBNT) are laying the groundwork for innovative applications across the healthcare sector. Nanodevices designed to operate within the body, managed remotely via the internet, are envisioned to promptly detect and actuate on potential diseases. In this vision, an inherent challenge arises due to the limited capabilities of individual nanosenso…
▽ More
Recent developments in the Internet of Bio-Nano Things (IoBNT) are laying the groundwork for innovative applications across the healthcare sector. Nanodevices designed to operate within the body, managed remotely via the internet, are envisioned to promptly detect and actuate on potential diseases. In this vision, an inherent challenge arises due to the limited capabilities of individual nanosensors; specifically, nanosensors must communicate with one another to collaborate as a cluster. Aiming to research the boundaries of the clustering capabilities, this survey emphasizes data-driven communication strategies in molecular communication (MC) channels as a means of linking nanosensors. Relying on the flexibility and robustness of machine learning (ML) methods to tackle the dynamic nature of MC channels, the MC research community frequently refers to neural network (NN) architectures. This interdisciplinary research field encompasses various aspects, including the use of NNs to facilitate communication in MC environments, their implementation at the nanoscale, explainable approaches for NNs, and dataset generation for training. Within this survey, we provide a comprehensive analysis of fundamental perspectives on recent trends in NN architectures for MC, the feasibility of their implementation at the nanoscale, applied explainable artificial intelligence (XAI) techniques, and the accessibility of datasets along with best practices for their generation. Additionally, we offer open-source code repositories that illustrate NN-based methods to support reproducible research for key MC scenarios. Finally, we identify emerging research challenges, such as robust NN architectures, biologically integrated NN modules, and scalable training strategies.
△ Less
Submitted 3 July, 2025; v1 submitted 25 June, 2025;
originally announced June 2025.
-
Quantum Enhanced Entropy Pool for Cryptographic Applications and Proofs
Authors:
Buniechukwu Njoku,
Sonai Biswas,
Milad Ghadimi,
Mohammad Shojafar,
Gabriele Gradoni,
Riccardo Bassoli,
Frank H. P. Fitzek
Abstract:
This paper investigates the integration of quantum randomness into Verifiable Random Functions (VRFs) using the Ed25519 elliptic curve to strengthen cryptographic security. By replacing traditional pseudorandom number generators with quantum entropy sources, we assess the impact on key security and performance metrics, including execution time, and resource usage. Our approach simulates a modified…
▽ More
This paper investigates the integration of quantum randomness into Verifiable Random Functions (VRFs) using the Ed25519 elliptic curve to strengthen cryptographic security. By replacing traditional pseudorandom number generators with quantum entropy sources, we assess the impact on key security and performance metrics, including execution time, and resource usage. Our approach simulates a modified VRF setup where initialization keys are derived from a quantum random number generator source (QRNG). The results show that while QRNGs could enhance the unpredictability and verifiability of VRFs, their incorporation introduces challenges related to temporal and computational overhead. This study provides valuable insights into the trade-offs of leveraging quantum randomness in API-driven cryptographic systems and offers a potential path toward more secure and efficient protocol design. The QRNG-based system shows increased (key generation times from 50 to 400+ microseconds, verification times from 500 to 3500 microseconds) and higher CPU usage (17% to 30%) compared to the more consistent performance of a Go-based VRF (key generation times below 200 microseconds, verification times under 2000 microseconds, CPU usage below 10%), highlighting trade-offs in computational efficiency and resource demands.
△ Less
Submitted 17 June, 2025;
originally announced June 2025.
-
Continuously Ordered Hierarchies of Algorithmic Information in Digital Twinning and Signal Processing
Authors:
Yannik N. Böck,
Holger Boche,
Frank H. P. Fitzek
Abstract:
We consider a fractional-calculus example of a continuous hierarchy of algorithmic information in the context of its potential applications in digital twinning. Digital twinning refers to different emerging methodologies in control engineering that involve the creation of a digital replica of some physical entity. From the perspective of computability theory, the problem of ensuring the digital tw…
▽ More
We consider a fractional-calculus example of a continuous hierarchy of algorithmic information in the context of its potential applications in digital twinning. Digital twinning refers to different emerging methodologies in control engineering that involve the creation of a digital replica of some physical entity. From the perspective of computability theory, the problem of ensuring the digital twin's integrity -- i.e., keeping it in a state where it matches its physical counterpart -- entails a notion of algorithmic information that determines which of the physical system's properties we can reliably deduce by algorithmically analyzing its digital twin. The present work investigates the fractional calculus of periodic functions -- particularly, we consider the Wiener algebra -- as an exemplary application of the algorithmic-information concept. We establish a continuously ordered hierarchy of algorithmic information among spaces of periodic functions -- depending on their fractional degree of smoothness -- in which the ordering relation determines whether a certain representation of some function contains ``more'' or ``less'' information than another. Additionally, we establish an analogous hierarchy among lp-spaces, which form a cornerstone of (traditional) digital signal processing. Notably, both hierarchies are (mathematically) ``dual'' to each other. From a practical perspective, our approach ultimately falls into the category of formal verification and (general) formal methods.
△ Less
Submitted 3 May, 2025;
originally announced May 2025.
-
Exhaled Breath Analysis Through the Lens of Molecular Communication: A Survey
Authors:
Sunasheer Bhattacharjee,
Dadi Bi,
Pit Hofmann,
Alexander Wietfeld,
Sophie Becke,
Michael Lommel,
Pengjie Zhou,
Ruifeng Zheng,
Ulrich Kertzscher,
Yansha Deng,
Wolfgang Kellerer,
Frank H. P. Fitzek,
Falko Dressler
Abstract:
Molecular Communication (MC) has long been envisioned to enable an Internet of Bio-Nano Things (IoBNT) with medical applications, where nanomachines within the human body conduct monitoring, diagnosis, and therapy at micro- and nanoscale levels. MC involves information transfer via molecules and is supported by well-established theoretical models. However, practically achieving reliable, energy-ef…
▽ More
Molecular Communication (MC) has long been envisioned to enable an Internet of Bio-Nano Things (IoBNT) with medical applications, where nanomachines within the human body conduct monitoring, diagnosis, and therapy at micro- and nanoscale levels. MC involves information transfer via molecules and is supported by well-established theoretical models. However, practically achieving reliable, energy-efficient, and bio-compatible communication at these scales still remains a challenge. Air-Based Molecular Communication (ABMC) is a type of MC that operates over larger, meter-scale distances and extends even outside the human body. Therefore, devices and techniques to realize ABMC are readily accessible, and associated use cases can be very promising in the near future. Exhaled breath analysis has previously been proposed. It provides a non-invasive approach for health monitoring, leveraging existing commercial sensor technologies and reducing deployment barriers. The breath contains a diverse range of molecules and particles that serve as biomarkers linked to various physiological and pathological conditions. The plethora of proven methods, models, and optimization approaches in MC enable macroscale breath analysis, treating human as the transmitter, the breath as the information carrier, and macroscale sensors as the receiver. Using ABMC to interface with the inherent dynamic networks of cells, tissues, and organs could create a novel Internet of Bio Things (IoBT), a preliminary macroscale stage of the IoBNT. This survey extensively reviews exhaled breath modeling and analysis through the lens of MC, offering insights into theoretical frameworks and practical implementations from ABMC, bringing the IoBT a step closer to real-world use.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Enabling Sustainable Urban Mobility: The Role of 5G Communication in the Mobilities for EU Project
Authors:
Shangqing Wang,
Christopher Lehmann,
Rico Radeke,
Frank H. P. Fitzek
Abstract:
This paper examines the role of 5G communication in the Mobilities for EU project, a collaborative initiative involving 29 partners and 11 pilots aimed at revolutionizing urban mobility through electrification, automation, and connectivity. Focusing on Dresden as a Lead City, we explore the integration of 27 innovative solutions, including autonomous freight transport, eBuses, and charging robots,…
▽ More
This paper examines the role of 5G communication in the Mobilities for EU project, a collaborative initiative involving 29 partners and 11 pilots aimed at revolutionizing urban mobility through electrification, automation, and connectivity. Focusing on Dresden as a Lead City, we explore the integration of 27 innovative solutions, including autonomous freight transport, eBuses, and charging robots, using a 5G communication network as the central framework. We analyze how 5G enables seamless connectivity and real-time data processing across diverse technologies, fostering interdependencies and synergies. This approach not only provides a cohesive understanding of the project's scope but also demonstrates 5G's critical role in smart city infrastructure. We evaluate the anticipated impact on sustainability metrics such as air quality, noise levels, CO2 emissions, and traffic congestion. The paper concludes by discussing challenges and strategies in leveraging 5G for comprehensive urban mobility solutions and its potential impact on future smart city developments.
△ Less
Submitted 5 December, 2024;
originally announced December 2024.
-
Advanced Plaque Modeling for Atherosclerosis Detection Using Molecular Communication
Authors:
Alexander Wietfeld,
Pit Hofmann,
Jonas Fuchtmann,
Pengjie Zhou,
Ruifeng Zheng,
Juan A. Cabrera,
Frank H. P. Fitzek,
Wolfgang Kellerer
Abstract:
As one of the most prevalent diseases worldwide, plaque formation in human arteries, known as atherosclerosis, is the focus of many research efforts. Previously, molecular communication (MC) models have been proposed to capture and analyze the natural processes inside the human body and to support the development of diagnosis and treatment methods. In the future, synthetic MC networks are envision…
▽ More
As one of the most prevalent diseases worldwide, plaque formation in human arteries, known as atherosclerosis, is the focus of many research efforts. Previously, molecular communication (MC) models have been proposed to capture and analyze the natural processes inside the human body and to support the development of diagnosis and treatment methods. In the future, synthetic MC networks are envisioned to span the human body as part of the Internet of Bio-Nano Things (IoBNT), turning blood vessels into physical communication channels. By observing and characterizing changes in these channels, MC networks could play an active role in detecting diseases like atherosclerosis. In this paper, building on previous preliminary work for simulating an MC scenario in a plaque-obstructed blood vessel, we evaluate different analytical models for non-Newtonian flow and derive associated channel impulse responses (CIRs). Additionally, we add the crucial factor of flow pulsatility to our simulation model and investigate the effect of the systole-diastole cycle on the received particles across the plaque channel. We observe a significant influence of the plaque on the channel in terms of the flow profile and CIR across different emission times in the cycle. These metrics could act as crucial indicators for early non-invasive plaque detection in advanced future MC methods.
△ Less
Submitted 20 November, 2024;
originally announced November 2024.
-
An Efficient Error Estimation Method in Quantum Key Distribution
Authors:
Yingjian Wang,
Yilun Hai,
Buniechukwu Njoku,
Koteswararao Kondepu,
Riccardo Bassoli,
Frank H. P. Fitzek
Abstract:
Error estimation is an important step for error correction in quantum key distribution. Traditional error estimation methods require sacrificing a part of the sifted key, forcing a trade-off between the accuracy of error estimation and the size of the partial sifted key to be used and discarded. In this paper, we propose a hybrid approach that aims to preserve the entire sifted key after error est…
▽ More
Error estimation is an important step for error correction in quantum key distribution. Traditional error estimation methods require sacrificing a part of the sifted key, forcing a trade-off between the accuracy of error estimation and the size of the partial sifted key to be used and discarded. In this paper, we propose a hybrid approach that aims to preserve the entire sifted key after error estimation while preventing Eve from gaining any advantage. The entire sifted key, modified and extended by our proposed method, is sent for error estimation in a public channel. Although accessible to an eavesdropper, the modified and extended sifted key ensures that the number of attempts to crack it remains the same as when no information is leaked. The entire sifted key is preserved for subsequent procedures, indicating the efficient utilization of quantum resources.
△ Less
Submitted 11 November, 2024;
originally announced November 2024.
-
Measurement Study of Programmable Network Coding in Cloud-native 5G and Beyond Networks
Authors:
Osel Lhamo,
Tung V. Doan,
Elif Tasdemir,
Mahdi Attawna,
Giang T. Nguyen,
Patrick Seeling,
Martin Reisslein,
Frank H. P. Fitzek
Abstract:
Emerging 5G/6G use cases span various industries, necessitating flexible solutions that leverage emerging technologies to meet diverse and stringent application requirements under changing network conditions. The standard 5G RAN solution, retransmission, reduces packet loss but can increase transmission delay in the process. Random Linear Network Coding (RLNC) offers an alternative by proactively…
▽ More
Emerging 5G/6G use cases span various industries, necessitating flexible solutions that leverage emerging technologies to meet diverse and stringent application requirements under changing network conditions. The standard 5G RAN solution, retransmission, reduces packet loss but can increase transmission delay in the process. Random Linear Network Coding (RLNC) offers an alternative by proactively sending combinations of original packets, thus reducing both delay and packet loss. Current research often only simulates the integration of RLNC in 5G while we implement and evaluate our approach on real commercially available hardware in a real-world deployment.
We introduce Flexible Network Coding (FlexNC), which enables the flexible fusion of several RLNC protocols by incorporating a forwarder with multiple RLNC nodes. Network operators can configure FlexNC based on network conditions and application requirements. To further boost network programmability, our Recoder in the Network (RecNet) leverages intermediate network nodes to join the coding process. Both the proposed algorithms have been implemented on OpenAirInterface and extensively tested with traffic from different applications in a real network. While FlexNC adapts to various application needs of latency and packet loss, RecNet significantly minimizes packet loss for a remote user with minimal increase in delay compared to pure RLNC.
△ Less
Submitted 12 August, 2024;
originally announced August 2024.
-
Deep Reinforcement Learning for the Joint Control of Traffic Light Signaling and Vehicle Speed Advice
Authors:
Johannes V. S. Busch,
Robert Voelckner,
Peter Sossalla,
Christian L. Vielhaus,
Roberto Calandra,
Frank H. P. Fitzek
Abstract:
Traffic congestion in dense urban centers presents an economical and environmental burden. In recent years, the availability of vehicle-to-anything communication allows for the transmission of detailed vehicle states to the infrastructure that can be used for intelligent traffic light control. The other way around, the infrastructure can provide vehicles with advice on driving behavior, such as ap…
▽ More
Traffic congestion in dense urban centers presents an economical and environmental burden. In recent years, the availability of vehicle-to-anything communication allows for the transmission of detailed vehicle states to the infrastructure that can be used for intelligent traffic light control. The other way around, the infrastructure can provide vehicles with advice on driving behavior, such as appropriate velocities, which can improve the efficacy of the traffic system. Several research works applied deep reinforcement learning to either traffic light control or vehicle speed advice. In this work, we propose a first attempt to jointly learn the control of both. We show this to improve the efficacy of traffic systems. In our experiments, the joint control approach reduces average vehicle trip delays, w.r.t. controlling only traffic lights, in eight out of eleven benchmark scenarios. Analyzing the qualitative behavior of the vehicle speed advice policy, we observe that this is achieved by smoothing out the velocity profile of vehicles nearby a traffic light. Learning joint control of traffic signaling and speed advice in the real world could help to reduce congestion and mitigate the economical and environmental repercussions of today's traffic systems.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Machine Learning for QoS Prediction in Vehicular Communication: Challenges and Solution Approaches
Authors:
Alexandros Palaios,
Christian L. Vielhaus,
Daniel F. Külzer,
Cara Watermann,
Rodrigo Hernangomez,
Sanket Partani,
Philipp Geuer,
Anton Krause,
Raja Sattiraju,
Martin Kasparick,
Gerhard Fettweis,
Frank H. P. Fitzek,
Hans D. Schotten,
Slawomir Stanczak
Abstract:
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive…
▽ More
As cellular networks evolve towards the 6th generation, machine learning is seen as a key enabling technology to improve the capabilities of the network. Machine learning provides a methodology for predictive systems, which can make networks become proactive. This proactive behavior of the network can be leveraged to sustain, for example, a specific quality of service requirement. With predictive quality of service, a wide variety of new use cases, both safety- and entertainment-related, are emerging, especially in the automotive sector. Therefore, in this work, we consider maximum throughput prediction enhancing, for example, streaming or high-definition mapping applications. We discuss the entire machine learning workflow highlighting less regarded aspects such as the detailed sampling procedures, the in-depth analysis of the dataset characteristics, the effects of splits in the provided results, and the data availability. Reliable machine learning models need to face a lot of challenges during their lifecycle. We highlight how confidence can be built on machine learning technologies by better understanding the underlying characteristics of the collected data. We discuss feature engineering and the effects of different splits for the training processes, showcasing that random splits might overestimate performance by more than twofold. Moreover, we investigate diverse sets of input features, where network information proved to be most effective, cutting the error by half. Part of our contribution is the validation of multiple machine learning models within diverse scenarios. We also use explainable AI to show that machine learning can learn underlying principles of wireless networks without being explicitly programmed. Our data is collected from a deployed network that was under full control of the measurement team and covered different vehicular scenarios and radio environments.
△ Less
Submitted 22 August, 2023; v1 submitted 23 February, 2023;
originally announced February 2023.
-
Berlin V2X: A Machine Learning Dataset from Multiple Vehicles and Radio Access Technologies
Authors:
Rodrigo Hernangómez,
Philipp Geuer,
Alexandros Palaios,
Daniel Schäufele,
Cara Watermann,
Khawla Taleb-Bouhemadi,
Mohammad Parvini,
Anton Krause,
Sanket Partani,
Christian Vielhaus,
Martin Kasparick,
Daniel F. Külzer,
Friedrich Burmeister,
Frank H. P. Fitzek,
Hans D. Schotten,
Gerhard Fettweis,
Sławomir Stańczak
Abstract:
The evolution of wireless communications into 6G and beyond is expected to rely on new machine learning (ML)-based capabilities. These can enable proactive decisions and actions from wireless-network components to sustain quality-of-service (QoS) and user experience. Moreover, new use cases in the area of vehicular and industrial communications will emerge. Specifically in the area of vehicle comm…
▽ More
The evolution of wireless communications into 6G and beyond is expected to rely on new machine learning (ML)-based capabilities. These can enable proactive decisions and actions from wireless-network components to sustain quality-of-service (QoS) and user experience. Moreover, new use cases in the area of vehicular and industrial communications will emerge. Specifically in the area of vehicle communication, vehicle-to-everything (V2X) schemes will benefit strongly from such advances. With this in mind, we have conducted a detailed measurement campaign that paves the way to a plethora of diverse ML-based studies. The resulting datasets offer GPS-located wireless measurements across diverse urban environments for both cellular (with two different operators) and sidelink radio access technologies, thus enabling a variety of different studies towards V2X. The datasets are labeled and sampled with a high time resolution. Furthermore, we make the data publicly available with all the necessary information to support the onboarding of new researchers. We provide an initial analysis of the data showing some of the challenges that ML needs to overcome and the features that ML can leverage, as well as some hints at potential research studies.
△ Less
Submitted 14 April, 2023; v1 submitted 20 December, 2022;
originally announced December 2022.
-
TSN-FlexTest: Flexible TSN Measurement Testbed (Extended Version)
Authors:
Marian Ulbricht,
Stefan Senk,
Hosein K. Nazari,
How-Hang Liu,
Martin Reisslein,
Giang T. Nguyen,
Frank H. P. Fitzek
Abstract:
Robust, reliable, and deterministic networks are essential for a variety of applications. In order to provide guaranteed communication network services, Time-Sensitive Networking (TSN) unites a set of standards for time-synchronization, flow control, enhanced reliability, and management. We design the TSN-FlexTest testbed with generic commodity hardware and open-source software components to enabl…
▽ More
Robust, reliable, and deterministic networks are essential for a variety of applications. In order to provide guaranteed communication network services, Time-Sensitive Networking (TSN) unites a set of standards for time-synchronization, flow control, enhanced reliability, and management. We design the TSN-FlexTest testbed with generic commodity hardware and open-source software components to enable flexible TSN measurements. We have conducted extensive measurements to validate the TSN-FlexTest testbed and to examine TSN characteristics. The measurements provide insights into the effects of TSN configurations, such as increasing the number of synchronization messages for the Precision Time Protocol, indicating that a measurement accuracy of 15 ns can be achieved. The TSN measurements included extensive evaluations of the Time-aware Shaper (TAS) for sets of Tactile Internet (TI) packet traffic streams. The measurements elucidate the effects of different scheduling and shaping approaches, while revealing the need for pervasive network control that synchronizes the sending nodes with the network switches. We present the first measurements of distributed TAS with synchronized senders on a commodity hardware testbed, demonstrating the same Quality-of-Service as with dedicated wires for high-priority TI streams despite a 200% over-saturation cross traffic load. The testbed is provided as an open-source project to facilitate future TSN research.
△ Less
Submitted 27 November, 2023; v1 submitted 18 November, 2022;
originally announced November 2022.
-
Functional Split of In-Network Deep Learning for 6G: A Feasibility Study
Authors:
Jia He,
Huanzhuo Wu,
Xun Xiao,
Riccardo Bassoli,
Frank H. P. Fitzek
Abstract:
In existing mobile network systems, the data plane (DP) is mainly considered a pipeline consisting of network elements end-to-end forwarding user data traffics. With the rapid maturity of programmable network devices, however, mobile network infrastructure mutates towards a programmable computing platform. Therefore, such a programmable DP can provide in-network computing capability for many appli…
▽ More
In existing mobile network systems, the data plane (DP) is mainly considered a pipeline consisting of network elements end-to-end forwarding user data traffics. With the rapid maturity of programmable network devices, however, mobile network infrastructure mutates towards a programmable computing platform. Therefore, such a programmable DP can provide in-network computing capability for many application services. In this paper, we target to enhance the data plane with in-network deep learning (DL) capability. However, in-network intelligence can be a significant load for network devices. Then, the paradigm of the functional split is applied so that the deep neural network (DNN) is decomposed into sub-elements of the data plane for making machine learning inference jobs more efficient. As a proof-of-concept, we take a Blind Source Separation (BSS) problem as an example to exhibit the benefits of such an approach. We implement the proposed enhancement in a full-stack emulator and we provide a quantitative evaluation with professional datasets. As an initial trial, our study provides insightful guidelines for the design of the future mobile network system, employing in-network intelligence (e.g., 6G).
△ Less
Submitted 14 November, 2022;
originally announced November 2022.
-
A New Agent-Based Intelligent Network Architecture
Authors:
Sisay Tadesse Arzo,
Domenico Scotece,
Riccardo Bassoli,
Fabrizio Granelli,
Luca Foschini,
Frank H. P. Fitzek
Abstract:
The advent of 5G and the design of its architecture has become possible because of the previous individual scientific works and standardization efforts on cloud computing and network softwarization. Software-defined Networking and Network Function Virtualization started separately to find their convolution into 5G network architecture. Then, the ongoing design of the future beyond 5G (B5G) and 6G…
▽ More
The advent of 5G and the design of its architecture has become possible because of the previous individual scientific works and standardization efforts on cloud computing and network softwarization. Software-defined Networking and Network Function Virtualization started separately to find their convolution into 5G network architecture. Then, the ongoing design of the future beyond 5G (B5G) and 6G network architecture cannot overlook the pivotal inputs of different independent standardization efforts about autonomic networking, service-based communication systems, and multi-access edge computing. This article provides the design and the characteristics of an agent-based, softwarized, and intelligent architecture, which coherently condenses and merges the independent proposed architectural works by different standardization working groups and bodies. This novel work is a helpful means for the design and standardization process of the futureB5G and 6G network architecture.
△ Less
Submitted 3 November, 2022;
originally announced November 2022.
-
Neuromorphic Twins for Networked Control and Decision-Making
Authors:
Holger Boche,
Yannik N. Böck,
Christian Deppe,
Frank H. P. Fitzek
Abstract:
We consider the problem of remotely tracking the state of and unstable linear time-invariant plant by means of data transmitted through a noisy communication channel from an algorithmic point of view. Assuming the dynamics of the plant are known, does there exist an algorithm that accepts a description of the channel's characteristics as input, and returns 'Yes' if the transmission capabilities pe…
▽ More
We consider the problem of remotely tracking the state of and unstable linear time-invariant plant by means of data transmitted through a noisy communication channel from an algorithmic point of view. Assuming the dynamics of the plant are known, does there exist an algorithm that accepts a description of the channel's characteristics as input, and returns 'Yes' if the transmission capabilities permit the remote tracking of the plant's state, 'No' otherwise? Does there exist an algorithm that, in case of a positive answer, computes a suitable encoder/decoder-pair for the channel? Questions of this kind are becoming increasingly important with regards to future communication technologies that aim to solve control engineering tasks in a distributed manner. In particular, they play an essential role in digital twinning, an emerging information processing approach originally considered in the context of Industry 4.0. Yet, the abovementioned questions have been answered in the negative with respect to algorithms that can be implemented on idealized digital hardware, i.e., Turing machines. In this article, we investigate the remote state estimation problem in view of the Blum-Shub-Smale computability framework. In the broadest sense, the latter can be interpreted as a model for idealized analog computation. Especially in the context of neuromorphic computing, analog hardware has experienced a revival in the past view years. Hence, the contribution of this work may serve as a motivation for a theory of neuromorphic twins as a counterpart to digital twins for analog hardware.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks
Authors:
Holger Boche,
Rafael F. Schaefer,
H. Vincent Poor,
Frank H. P. Fitzek
Abstract:
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularl…
▽ More
As we are more and more dependent on the communication technologies, resilience against any attacks on communication networks is important to guarantee the digital sovereignty of our society. New developments of communication networks tackle the problem of resilience by in-network computing approaches for higher protocol layers, while the physical layer remains an open problem. This is particularly true for wireless communication systems which are inherently vulnerable to adversarial attacks due to the open nature of the wireless medium. In denial-of-service (DoS) attacks, an active adversary is able to completely disrupt the communication and it has been shown that Turing machines are incapable of detecting such attacks. As Turing machines provide the fundamental limits of digital information processing and therewith of digital twins, this implies that even the most powerful digital twins that preserve all information of the physical network error-free are not capable of detecting such attacks. This stimulates the question of how powerful the information processing hardware must be to enable the detection of DoS attacks. Therefore, in the paper the need of neuromorphic twins is advocated and by the use of Blum-Shub-Smale machines a first implementation that enables the detection of DoS attacks is shown. This result holds for both cases of with and without constraints on the input and jamming sequences of the adversary.
△ Less
Submitted 29 October, 2022;
originally announced October 2022.
-
Network Functional Compression for Control Applications
Authors:
Sifat Rezwan,
Juan A. Cabrera,
Frank H. P. Fitzek
Abstract:
The trend of future communication systems is to aim for the steering and control of cyber physical systems. These systems can quickly become congested in environments like those presented in Industry 4.0. In these scenarios, a plethora of sensor data is transmitted wirelessly to multiple in network controllers that compute the control functions of the cyber physical systems. In this paper, we show…
▽ More
The trend of future communication systems is to aim for the steering and control of cyber physical systems. These systems can quickly become congested in environments like those presented in Industry 4.0. In these scenarios, a plethora of sensor data is transmitted wirelessly to multiple in network controllers that compute the control functions of the cyber physical systems. In this paper, we show an implementation of network Functional Compression (FC) as a proof of concept to drastically reduce the data traffic in these scenarios. FC is a form of goal-oriented communication scheme in which the objective of the sender receiver pair is to transmit the minimum amount of information to compute a function at the receiver end. In our scenario, the senders transmit an encoded and compressed version of the sensor data to a destination, an in-network controller interested in computing as its target function, a PID controller. We show that it is possible to achieve compression rates of over 50% in some cases by employing FC. We also show that using FC in a distributed cascade fashion can achieve more significant compression rates while reducing computational costs.
△ Less
Submitted 26 October, 2022;
originally announced October 2022.
-
On the Need of Analog Signals and Systems for Digital-Twin Representations
Authors:
Holger Boche,
Ullrich J. Mönich,
Yannik N. Böck,
Frank H. P. Fitzek
Abstract:
We consider the task of converting different digital descriptions of analog bandlimited signals and systems into each other, with a rigorous application of mathematical computability theory. Albeit very fundamental, the problem appears in the scope of digital twinning, an emerging concept in the field of digital processing of analog information that is regularly mentioned as one of the key enabler…
▽ More
We consider the task of converting different digital descriptions of analog bandlimited signals and systems into each other, with a rigorous application of mathematical computability theory. Albeit very fundamental, the problem appears in the scope of digital twinning, an emerging concept in the field of digital processing of analog information that is regularly mentioned as one of the key enablers for next-generation cyber-physical systems and their areas of application. In this context, we prove that essential quantities such as the peak-to-average power ratio and the bounded-input/bounded-output norm, which determine the behavior of the real-world analog system, cannot generally be determined from the system's digital twin, depending on which of the above-mentioned descriptions is chosen. As a main result, we characterize the algorithmic strength of Shannon's sampling type representation as digital twin implementation and also introduce a new digital twin implementation of analog signals and systems. We show there exist two digital descriptions, both of which uniquely characterize a certain analog system, such that one description can be algorithmically converted into the other, but not vice versa.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
An Analytical Study on Functional Split in Martian 3D Networks
Authors:
Stefano Bonafini,
Claudio Sacchi,
Riccardo Bassoli,
Fabrizio Granelli,
Koteswararao Kondepu,
Frank H. P. Fitzek
Abstract:
As space agencies are planning manned missions to reach Mars, researchers need to pave the way for supporting astronauts during their sojourn. This will also be achieved by providing broadband and low-latency connectivity through wireless network infrastructures. In such a framework, we propose a Martian deployment of a 3-Dimensional (3D) network acting as Cloud Radio Access Network (C-RAN). The s…
▽ More
As space agencies are planning manned missions to reach Mars, researchers need to pave the way for supporting astronauts during their sojourn. This will also be achieved by providing broadband and low-latency connectivity through wireless network infrastructures. In such a framework, we propose a Martian deployment of a 3-Dimensional (3D) network acting as Cloud Radio Access Network (C-RAN). The scenario consists, mostly, of unmanned aerial vehicles (UAVs) and nanosatellites. Thanks to the thin Martian atmosphere, CubeSats can stably orbit at very-low-altitude. This allows to meet strict delay requirements to split functions of the baseband processing between drones and CubeSats. The detailed analytical study, presented in this paper, confirmed the viability of the proposed 3D architecture, under some constraints and trade-off concerning the involved Space communication infrastructures, that are discussed in detail.
△ Less
Submitted 6 June, 2022;
originally announced July 2022.
-
Reference Network and Localization Architecture for Smart Manufacturing based on 5G
Authors:
Stephan Ludwig,
Doris Aschenbrenner,
Marvin Scharle,
Henrik Klessig,
Michael Karrenbauer,
Huanzhuo Wu,
Maroua Taghouti,
Pedro Lozano,
Hans D. Schotten,
Frank H. P. Fitzek
Abstract:
5G promises to shift Industry 4.0 to the next level by allowing flexible production. However, many communication standards are used throughout a production site, which will stay so in the foreseeable future. Furthermore, localization of assets will be equally valuable in order to get to a higher level of automation. This paper proposes a reference architecture for a convergent localization and com…
▽ More
5G promises to shift Industry 4.0 to the next level by allowing flexible production. However, many communication standards are used throughout a production site, which will stay so in the foreseeable future. Furthermore, localization of assets will be equally valuable in order to get to a higher level of automation. This paper proposes a reference architecture for a convergent localization and communication network for smart manufacturing that combines 5G with other existing technologies and focuses on high-mix low-volume application, in particular at small and medium-sized enterprises. The architecture is derived from a set of functional requirements, and we describe different views on this architecture to show how the requirements can be fulfilled. It connects private and public mobile networks with local networking technologies to achieve a flexible setup addressing many industrial use cases.
△ Less
Submitted 4 April, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
In-Network Processing for Low-Latency Industrial Anomaly Detection in Softwarized Networks
Authors:
Huanzhuo Wu,
Jia He,
Máté Tömösközi,
Zuo Xiang,
Frank H. P. Fitzek
Abstract:
Modern manufacturers are currently undertaking the integration of novel digital technologies - such as 5G-based wireless networks, the Internet of Things (IoT), and cloud computing - to elevate their production process to a brand new level, the level of smart factories. In the setting of a modern smart factory, time-critical applications are increasingly important to facilitate efficient and safe…
▽ More
Modern manufacturers are currently undertaking the integration of novel digital technologies - such as 5G-based wireless networks, the Internet of Things (IoT), and cloud computing - to elevate their production process to a brand new level, the level of smart factories. In the setting of a modern smart factory, time-critical applications are increasingly important to facilitate efficient and safe production. However, these applications suffer from delays in data transmission and processing due to the high density of wireless sensors and the large volumes of data that they generate. As the advent of next-generation networks has made network nodes intelligent and capable of handling multiple network functions, the increased computational power of the nodes makes it possible to offload some of the computational overhead. In this paper, we show for the first time our IA-Net-Lite industrial anomaly detection system with the novel capability of in-network data processing. IA-Net-Lite utilizes intelligent network devices to combine data transmission and processing, as well as to progressively filter redundant data in order to optimize service latency. By testing in a practical network emulator, we showed that the proposed approach can reduce the service latency by up to 40%. Moreover, the benefits of our approach could potentially be exploited in other large-volume and artificial intelligence applications.
△ Less
Submitted 7 December, 2021;
originally announced December 2021.
-
In-Network Processing Acoustic Data for Anomaly Detection in Smart Factory
Authors:
Huanzhuo Wu,
Yunbin Shen,
Xun Xiao,
Artur Hecker,
Frank H. P. Fitzek
Abstract:
Modern manufacturing is now deeply integrating new technologies such as 5G, Internet-of-things (IoT), and cloud/edge computing to shape manufacturing to a new level -- Smart Factory. Autonomic anomaly detection (e.g., malfunctioning machines and hazard situations) in a factory hall is on the list and expects to be realized with massive IoT sensor deployments. In this paper, we consider acoustic da…
▽ More
Modern manufacturing is now deeply integrating new technologies such as 5G, Internet-of-things (IoT), and cloud/edge computing to shape manufacturing to a new level -- Smart Factory. Autonomic anomaly detection (e.g., malfunctioning machines and hazard situations) in a factory hall is on the list and expects to be realized with massive IoT sensor deployments. In this paper, we consider acoustic data-based anomaly detection, which is widely used in factories because sound information reflects richer internal states while videos cannot; besides, the capital investment of an audio system is more economically friendly. However, a unique challenge of using audio data is that sounds are mixed when collecting thus source data separation is inevitable. A traditional way transfers audio data all to a centralized point for separation. Nevertheless, such a centralized manner (i.e., data transferring and then analyzing) may delay prompt reactions to critical anomalies. We demonstrate that this job can be transformed into an in-network processing scheme and thus further accelerated. Specifically, we propose a progressive processing scheme where data separation jobs are distributed as microservices on intermediate nodes in parallel with data forwarding. Therefore, collected audio data can be separated 43.75% faster with even less total computing resources. This solution is comprehensively evaluated with numerical simulations, compared with benchmark solutions, and results justify its advantages.
△ Less
Submitted 4 October, 2021;
originally announced October 2021.
-
V-Edge: Virtual Edge Computing as an Enabler for Novel Microservices and Cooperative Computing
Authors:
Falko Dressler,
Carla Fabiana Chiasserini,
Frank H. P. Fitzek,
Holger Karl,
Renato Lo Cigno,
Antonio Capone,
Claudio Casetti,
Francesco Malandrino,
Vincenzo Mancuso,
Florian Klingler,
Gianluca Rizzo
Abstract:
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as p…
▽ More
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as proxy for the cloud. Yet this promising idea is hampered by the limited availability of such edge servers. In this paper, we discuss a way forward, namely the virtual edge computing (V-Edge) concept. V-Edge bridges the gap between cloud, edge, and fog by virtualizing all available resources including the end users' devices and making these resources widely available using well-defined interfaces. V-Edge also acts as an enabler for novel microservices as well as cooperative computing solutions. We introduce the general V-Edge architecture and we characterize some of the key research challenges to overcome, in order to enable wide-spread and even more powerful edge services.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
The Computational and Latency Advantage of Quantum Communication Networks
Authors:
Roberto Ferrara,
Riccardo Bassoli,
Christian Deppe,
Frank H. P. Fitzek,
Holger Boche
Abstract:
This article summarises the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. By now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve the needs of quantum computers. In fact, the scientifi…
▽ More
This article summarises the current status of classical communication networks and identifies some critical open research challenges that can only be solved by leveraging quantum technologies. By now, the main goal of quantum communication networks has been security. However, quantum networks can do more than just exchange secure keys or serve the needs of quantum computers. In fact, the scientific community is still investigating on the possible use cases/benefits that quantum communication networks can bring. Thus, this article aims at pointing out and clearly describing how quantum communication networks can enhance in-network distributed computing and reduce the overall end-to-end latency, beyond the intrinsic limits of classical technologies. Furthermore, we also explain how entanglement can reduce the communication complexity (overhead) that future classical virtualised networks will experience.
△ Less
Submitted 7 June, 2021;
originally announced June 2021.
-
Secure Virtual Mobile Small Cells: A Stepping Stone Towards 6G
Authors:
J. Rodriguez,
G. P. Koudouridis,
X. Gelabert,
M. Tayyab,
R. Bassoli,
F. H. P. Fitzek,
R. Torre,
R. Abd-Alhameed,
M. Sajedin,
I. Elfergani,
S. Irum,
G. Schulte,
P. Diogo,
F. Marzouk,
M. de Ree,
G. Mantas,
I. Politis
Abstract:
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are c…
▽ More
As 5th Generation research reaches the twilight, the research community must go beyond 5G and look towards the 2030 connectivity landscape, namely 6G. In this context, this work takes a step towards the 6G vision by proposing a next generation communication platform, which aims to extend the rigid coverage area of fixed deployment networks by considering virtual mobile small cells (MSC) that are created on demand. Relying on emerging computing paradigms such as NFV (Network Function Virtualization) and SDN (Software Defined Networking), these cells can harness radio and networking capability locally reducing protocol signaling latency and overhead. These MSCs constitute an intelligent pool of networking resources that can collaborate to form a wireless network of MSCs providing a communication platform for localized, ubiquitous and reliable connectivity. The technology enablers for implementing the MSC concept are also addressed in terms of virtualization, lightweight wireless security, and energy efficient RF. The benefits of the MSC architecture towards reliable and efficient cell offloading are demonstrated as a use-case.
△ Less
Submitted 4 May, 2021;
originally announced May 2021.
-
Why We Should NOT Talk about 6G
Authors:
Frank H. P. Fitzek,
Patrick Seeling
Abstract:
While 5G mobile communication systems are currently in deployment, researchers around the world have already started to discuss 6G technology and funding agencies started their first programs with a 6G label. Although it may seem like a good idea from a historical point of view with returning generations every decade, this contribution will show that there is a great risk of introducing 6G labels…
▽ More
While 5G mobile communication systems are currently in deployment, researchers around the world have already started to discuss 6G technology and funding agencies started their first programs with a 6G label. Although it may seem like a good idea from a historical point of view with returning generations every decade, this contribution will show that there is a great risk of introducing 6G labels at this time. While the reasons to not talk about 6G yet are manifold, some of the more dominant ones are i.) there exists a lack of real technology advancements introduced by a potential 6G system; ii.) the flexibility of the 5G communication system introduced by softwarization concepts, such as in the Internet community, allows for daily updates; and iii.) introducing widespread 6G discussions can have a negative impact on the deployment and evolution of 5G with completely new business cases and customer ecosystems compared to its predecessors. Finally, as we do not believe that 5G is the end of our journey, we will provide an outlook on the future of mobile communication systems, independent of the current mainstream discussion.
△ Less
Submitted 4 March, 2020;
originally announced March 2020.
-
S-PRAC: Fast Partial Packet Recovery with Network Coding in Very Noisy Wireless Channels
Authors:
Kurniawan D. Irianto,
Juan A. Cabrera,
Giang T. Nguyen,
Hani Salah,
Frank H. P. Fitzek
Abstract:
Well-known error detection and correction solutions in wireless communications are slow or incur high transmission overhead. Recently, notable solutions like PRAC and DAPRAC, implementing partial packet recovery with network coding, could address these problems. However, they perform slowly when there are many errors. We propose S-PRAC, a fast scheme for partial packet recovery, particularly desig…
▽ More
Well-known error detection and correction solutions in wireless communications are slow or incur high transmission overhead. Recently, notable solutions like PRAC and DAPRAC, implementing partial packet recovery with network coding, could address these problems. However, they perform slowly when there are many errors. We propose S-PRAC, a fast scheme for partial packet recovery, particularly designed for very noisy wireless channels. S-PRAC improves on DAPRAC. It divides each packet into segments consisting of a fixed number of small RLNC encoded symbols and then attaches a CRC code to each segment and one to each coded packet. Extensive simulations show that S-PRAC can detect and correct errors quickly. It also outperforms DAPRAC significantly when the number of errors is high.
△ Less
Submitted 27 February, 2019;
originally announced February 2019.
-
APMEC: An Automated Provisioning Framework for Multi-access Edge Computing
Authors:
Tung V. Doan,
Giang T. Nguyen,
Alexander Kropp,
Frank H. P. Fitzek
Abstract:
Novel use cases and verticals such as connected cars and human-robot cooperation in the areas of 5G and Tactile Internet can significantly benefit from the flexibility and reduced latency provided by Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC). Existing frameworks managing and orchestrating MEC and NFV are either tightly coupled or completely separated. The former d…
▽ More
Novel use cases and verticals such as connected cars and human-robot cooperation in the areas of 5G and Tactile Internet can significantly benefit from the flexibility and reduced latency provided by Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC). Existing frameworks managing and orchestrating MEC and NFV are either tightly coupled or completely separated. The former design is inflexible and increases the complexity of one framework. Whereas, the latter leads to inefficient use of computation resources because information are not shared. We introduce APMEC, a dedicated framework for MEC while enabling the collaboration with the management and orchestration (MANO) frameworks for NFV. The new design allows to reuse allocated network services, thus maximizing resource utilization. Measurement results have shown that APMEC can allocate up to 60% more number of network services. Being developed on top of OpenStack, APMEC is an open source project, available for collaboration and facilitating further research activities.
△ Less
Submitted 9 May, 2022; v1 submitted 9 May, 2018;
originally announced May 2018.
-
Multipath Communication with Finite Sliding Window Network Coding for Ultra-Reliability and Low Latency
Authors:
Frank Gabriel,
Anil Kumar Chorppath,
Ievgenii Tsokalo,
Frank H. P. Fitzek
Abstract:
We use random linear network coding (RLNC) based scheme for multipath communication in the presence of lossy links with different delay characteristics to obtain ultra-reliability and low latency. A sliding window version of RLNC is proposed where the coded packets are generated using packets in a window size and are inserted among systematic packets in different paths. The packets are scheduled i…
▽ More
We use random linear network coding (RLNC) based scheme for multipath communication in the presence of lossy links with different delay characteristics to obtain ultra-reliability and low latency. A sliding window version of RLNC is proposed where the coded packets are generated using packets in a window size and are inserted among systematic packets in different paths. The packets are scheduled in the paths in a round robin fashion proportional to the data rates. We use finite encoding and decoding window size and do not rely on feedback for closing the sliding window, unlike the previous work. Our implementation of two paths with LTE and WiFi characteristics shows that the proposed sliding window scheme achieves better latency compared to the block RLNC code. It is also shown that the proposed scheme achieves low latency communication through multiple paths compared to the individual paths for bursty traffic by translating the throughput on both the paths into latency gain.
△ Less
Submitted 1 February, 2018;
originally announced February 2018.
-
Match Made in Heaven: Practical Compressed Sensing and Network Coding for Intelligent Distributed Communication Networks
Authors:
Maroua Taghouti,
Anil Kumar Chorppath,
Tobias Waurick,
Frank H. P. Fitzek
Abstract:
Based on the impressive features that network coding and compressed sensing paradigms have separately brought, the idea of bringing them together in practice will result in major improvements and influence in the upcoming 5G networks. In this context, this paper aims to evaluate the effectiveness of these key techniques in a cluster-based wireless sensor network, in the presence of temporal and sp…
▽ More
Based on the impressive features that network coding and compressed sensing paradigms have separately brought, the idea of bringing them together in practice will result in major improvements and influence in the upcoming 5G networks. In this context, this paper aims to evaluate the effectiveness of these key techniques in a cluster-based wireless sensor network, in the presence of temporal and spatial correlations. Our goal is to achieve better compression gains by scaling down the total payload carried by applying temporal compression as well as reducing the total number of transmissions in the network using real field network coding. In order to further reduce the number of transmissions, the cluster-heads perform a low complexity spatial pre-coding consisting of sending the packets with a certain probability. Furthermore, we compare our approach with benchmark schemes. As expected, our numerical results run on NS3 simulator show that on overall our scheme dramatically drops the number of transmitted packets in the considered cluster topology with a very high reconstruction SNR.
△ Less
Submitted 9 November, 2017;
originally announced November 2017.
-
Network Coding as a Service
Authors:
Dávid Szabó,
Attila Csoma,
Péter Megyesi,
András Gulyás,
Frank H. P. Fitzek
Abstract:
Network Coding (NC) shows great potential in various communication scenarios through changing the packet forwarding principles of current networks. It can improve not only throughput, latency, reliability and security but also alleviates the need of coordination in many cases. However, it is still controversial due to widespread misunderstandings on how to exploit the advantages of it. The aim of…
▽ More
Network Coding (NC) shows great potential in various communication scenarios through changing the packet forwarding principles of current networks. It can improve not only throughput, latency, reliability and security but also alleviates the need of coordination in many cases. However, it is still controversial due to widespread misunderstandings on how to exploit the advantages of it. The aim of the paper is to facilitate the usage of NC by $(i)$ explaining how it can improve the performance of the network (regardless the existence of any butterfly in the network), $(ii)$ showing how Software Defined Networking (SDN) can resolve the crucial problems of deployment and orchestration of NC elements, and $(iii)$ providing a prototype architecture with measurement results on the performance of our network coding capable software router implementation compared by fountain codes.
△ Less
Submitted 13 January, 2016;
originally announced January 2016.
-
Perpetual Codes for Network Coding
Authors:
Janus Heide,
Morten V. Pedersen,
Frank H. P. Fitzek,
Muriel M edard
Abstract:
Random Linear Network Coding (RLNC) provides a theoretically efficient method for coding. Some of its practical drawbacks are the complexity of decoding and the overhead due to the coding vectors. For computationally weak and battery-driven platforms, these challenges are particular important. In this work, we consider the coding variant Perpetual codes which are sparse, non-uniform and the coding…
▽ More
Random Linear Network Coding (RLNC) provides a theoretically efficient method for coding. Some of its practical drawbacks are the complexity of decoding and the overhead due to the coding vectors. For computationally weak and battery-driven platforms, these challenges are particular important. In this work, we consider the coding variant Perpetual codes which are sparse, non-uniform and the coding vectors have a compact representation. The sparsity allows for fast encoding and decoding, and the non-uniform protection of symbols enables recoding where the produced symbols are indistinguishable from those encoded at the source. The presented results show that the approach can provide a coding overhead arbitrarily close to that of RLNC, but at reduced computational load. The achieved gain over RLNC grows with the generation size, and both encoding and decoding throughput is approximately one order of magnitude higher compared to RLNC at a generation size of 2048. Additionally, the approach allows for easy adjustment between coding throughput and code overhead, which makes it suitable for a broad range of platforms and applications.
△ Less
Submitted 15 September, 2015;
originally announced September 2015.
-
Fulcrum Network Codes: A Code for Fluid Allocation of Complexity
Authors:
Daniel E. Lucani,
Morten V. Pedersen,
Diego Ruano,
Chres W. Sørensen,
Frank H. P. Fitzek,
Janus Heide,
Olav Geil
Abstract:
This paper proposes Fulcrum network codes, a network coding framework that achieves three seemingly conflicting objectives: (i) to reduce the coding coefficient overhead to almost n bits per packet in a generation of n packets; (ii) to operate the network using only GF(2) operations at intermediate nodes if necessary, dramatically reducing complexity in the network; (iii) to deliver an end-to-end…
▽ More
This paper proposes Fulcrum network codes, a network coding framework that achieves three seemingly conflicting objectives: (i) to reduce the coding coefficient overhead to almost n bits per packet in a generation of n packets; (ii) to operate the network using only GF(2) operations at intermediate nodes if necessary, dramatically reducing complexity in the network; (iii) to deliver an end-to-end performance that is close to that of a high-field network coding system for high-end receivers while simultaneously catering to low-end receivers that decode in GF(2). As a consequence of (ii) and (iii), Fulcrum codes have a unique trait missing so far in the network coding literature: they provide the network with the flexibility to spread computational complexity over different devices depending on their current load, network conditions, or even energy targets in a decentralized way. At the core of our framework lies the idea of precoding at the sources using an expansion field GF(2h) to increase the number of dimensions seen by the network using a linear mapping. Fulcrum codes can use any high-field linear code for precoding, e.g., Reed-Solomon, with the structure of the precode determining some of the key features of the resulting code. For example, a systematic structure provides the ability to manage heterogeneous receivers while using the same data stream. Our analysis shows that the number of additional dimensions created during precoding controls the trade-off between delay, overhead, and complexity. Our implementation and measurements show that Fulcrum achieves similar decoding probability as high field Random Linear Network Coding (RLNC) approaches but with encoders/decoders that are an order of magnitude faster.
△ Less
Submitted 18 November, 2015; v1 submitted 26 April, 2014;
originally announced April 2014.