-
Leader Selection and Follower Association for UE-centric Distributed Learning in Future Wireless Networks
Authors:
Saeedeh Parsaeefard,
Sabine Roessel,
Anousheh Gholami Ghavamabad,
Robert Zaus,
Bernhard Raaf
Abstract:
User equipment (UE) devices with high compute performance acting on data with dynamic and stochastic nature to train Artificial Intelligence/Machine Learning (AI/ML) models call for real-time, agile distributed machine learning (DL) algorithms. Consequently, we focus on UE-centric DL algorithms where UEs initiate requests to adapt AI/ML models for better performance, e.g., locally refined AI/ML mo…
▽ More
User equipment (UE) devices with high compute performance acting on data with dynamic and stochastic nature to train Artificial Intelligence/Machine Learning (AI/ML) models call for real-time, agile distributed machine learning (DL) algorithms. Consequently, we focus on UE-centric DL algorithms where UEs initiate requests to adapt AI/ML models for better performance, e.g., locally refined AI/ML models among a set of headsets or smartphones. This new setup requires selecting a set of UEs as aggregators (here called leaders) and another set as followers, where all UEs update their models based on their local data, and followers share theirs with leaders for aggregation. From a networking perspective, the first question is how to select leaders and associate followers efficiently. This results in a high dimensional mixed integer programming problem and involves internal UE state information and state information among UEs, called external state information in this paper. To address this challenge, we introduce two new indices: a Leader Internal Index (LII), which is a function of the internal states of each device, demonstrating the willingness to be a leader such as battery life and AI/hardware accelerators, and a Leader eXternal Index (LXI), which is a function of external state information among UEs, such as trust, channel condition, and any aspect relevant for associating a follower with a leader. These two indices transform the highly complex leader selection and follower association problem into a better tractable formulation. More importantly, LIIs and LXIs allow to keep the internal and external state information of this problem inside of each device without compromising users' privacy.
△ Less
Submitted 26 September, 2024;
originally announced September 2024.
-
Interaction and Conflict Management in AI-assisted Operational Control Loops in 6G
Authors:
Saeedeh Parsaeefard,
Pooyan Habibi,
Alberto Leon Garcia
Abstract:
This paper studies autonomous and AI-assisted control loops (ACLs) in the next generation of wireless networks in the lens of multi-agent environments. We will study the diverse interactions and conflict management among these loops. We propose "interaction and conflict management" (ICM) modules to achieve coherent, consistent and interactions among these ACLs. We introduce three categories of ACL…
▽ More
This paper studies autonomous and AI-assisted control loops (ACLs) in the next generation of wireless networks in the lens of multi-agent environments. We will study the diverse interactions and conflict management among these loops. We propose "interaction and conflict management" (ICM) modules to achieve coherent, consistent and interactions among these ACLs. We introduce three categories of ACLs based on their sizes, their cooperative and competitive behaviors, and their sharing of datasets and models. These categories help to introduce conflict resolution and interaction management mechanisms for ICM. Using Kubernetes, we present an implementation of ICM to remove the conflicts in the scheduling and rescheduling of Pods for different ACLs in networks.
△ Less
Submitted 22 October, 2021;
originally announced October 2021.
-
Missing Data Estimation in Temporal Multilayer Position-aware Graph Neural Network (TMP-GNN)
Authors:
Bahareh Najafi,
Saeedeh Parsaeefard,
Alberto Leon-Garcia
Abstract:
GNNs have been proven to perform highly effective in various node-level, edge-level, and graph-level prediction tasks in several domains. Existing approaches mainly focus on static graphs. However, many graphs change over time with their edge may disappear, or node/edge attribute may alter from one time to the other. It is essential to consider such evolution in representation learning of nodes in…
▽ More
GNNs have been proven to perform highly effective in various node-level, edge-level, and graph-level prediction tasks in several domains. Existing approaches mainly focus on static graphs. However, many graphs change over time with their edge may disappear, or node/edge attribute may alter from one time to the other. It is essential to consider such evolution in representation learning of nodes in time varying graphs. In this paper, we propose a Temporal Multi-layered Position-aware Graph Neural Network (TMP-GNN), a node embedding approach for dynamic graph that incorporates the interdependence of temporal relations into embedding computation. We evaluate the performance of TMP-GNN on two different representations of temporal multilayered graphs. The performance is assessed against the most popular GNNs on node-level prediction tasks. Then, we incorporate TMP-GNN into a deep learning framework to estimate missing data and compare the performance with their corresponding competent GNNs from our former experiment, and a baseline method. Experimental results on four real-world datasets yield up to 58% of lower ROC AUC for pairwise node classification task, and 96% of lower MAE in missing feature estimation, particularly for graphs with a relatively high number of nodes and lower mean degree of connectivity.
△ Less
Submitted 14 January, 2022; v1 submitted 7 August, 2021;
originally announced August 2021.
-
Toward Efficient Transfer Learning in 6G
Authors:
Saeedeh Parsaeefard,
Alberto Leon-Garcia
Abstract:
6G networks will greatly expand the support for data-oriented, autonomous applications for over the top (OTT) and networking use cases. The success of these use cases will depend on the availability of big data sets which is not practical in many real scenarios due to the highly dynamic behavior of systems and the cost of data collection procedures. Transfer learning (TL) is a promising approach t…
▽ More
6G networks will greatly expand the support for data-oriented, autonomous applications for over the top (OTT) and networking use cases. The success of these use cases will depend on the availability of big data sets which is not practical in many real scenarios due to the highly dynamic behavior of systems and the cost of data collection procedures. Transfer learning (TL) is a promising approach to deal with these challenges through the sharing of knowledge among diverse learning algorithms. with TL, the learning rate and learning accuracy can be considerably improved. However, there are implementation challenges to efficiently deploy and utilize TL in 6G. In this paper, we initiate this discussion by providing some performance metrics to measure the TL success. Then, we show how infrastructure, application, management, and training planes of 6G can be adapted to handle TL. We provide examples of TL in 6G and highlight the spatio-temporal features of data in 6G that can lead to efficient TL. By simulation results, we demonstrate how transferring the quantized neural network weights between two use cases can make a trade-off between overheads and performance and attain more efficient TL in 6G. We also provide a list of future research directions in TL for 6G.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Generalized ADMM in Distributed Learning via Variational Inequality
Authors:
Saeedeh Parsaeefard,
Alberto Leon Garcia
Abstract:
Due to the explosion in size and complexity of modern data sets and privacy concerns of data holders, it is increasingly important to be able to solve machine learning problems in distributed manners. The Alternating Direction Method of Multipliers (ADMM) through the concept of consensus variables is a practical algorithm in this context where its diverse variations and its performance have been s…
▽ More
Due to the explosion in size and complexity of modern data sets and privacy concerns of data holders, it is increasingly important to be able to solve machine learning problems in distributed manners. The Alternating Direction Method of Multipliers (ADMM) through the concept of consensus variables is a practical algorithm in this context where its diverse variations and its performance have been studied in different application areas. In this paper, we study the effect of the local data sets of users in the distributed learning of ADMM. Our aim is to deploy variational inequality (VI) to attain an unified view of ADMM variations. Through the simulation results, we demonstrate how more general definitions of consensus parameters and introducing the uncertain parameters in distribute approach can help to get the better results in learning processes.
△ Less
Submitted 26 April, 2021;
originally announced April 2021.
-
Robust Federated Learning by Mixture of Experts
Authors:
Saeedeh Parsaeefard,
Sayed Ehsan Etesami,
Alberto Leon Garcia
Abstract:
We present a novel weighted average model based on the mixture of experts (MoE) concept to provide robustness in Federated learning (FL) against the poisoned/corrupted/outdated local models. These threats along with the non-IID nature of data sets can considerably diminish the accuracy of the FL model. Our proposed MoE-FL setup relies on the trust between users and the server where the users share…
▽ More
We present a novel weighted average model based on the mixture of experts (MoE) concept to provide robustness in Federated learning (FL) against the poisoned/corrupted/outdated local models. These threats along with the non-IID nature of data sets can considerably diminish the accuracy of the FL model. Our proposed MoE-FL setup relies on the trust between users and the server where the users share a portion of their public data sets with the server. The server applies a robust aggregation method by solving the optimization problem or the Softmax method to highlight the outlier cases and to reduce their adverse effect on the FL process. Our experiments illustrate that MoE-FL outperforms the performance of the traditional aggregation approach for high rate of poisoned data from attackers.
△ Less
Submitted 23 April, 2021;
originally announced April 2021.
-
Estimation of Missing Data in Intelligent Transportation System
Authors:
Bahareh Najafi,
Saeedeh Parsaeefard,
Alberto Leon-Garcia
Abstract:
Missing data is a challenge in many applications, including intelligent transportation systems (ITS). In this paper, we study traffic speed and travel time estimations in ITS, where portions of the collected data are missing due to sensor instability and communication errors at collection points. These practical issues can be remediated by missing data analysis, which are mainly categorized as eit…
▽ More
Missing data is a challenge in many applications, including intelligent transportation systems (ITS). In this paper, we study traffic speed and travel time estimations in ITS, where portions of the collected data are missing due to sensor instability and communication errors at collection points. These practical issues can be remediated by missing data analysis, which are mainly categorized as either statistical or machine learning(ML)-based approaches. Statistical methods require the prior probability distribution of the data which is unknown in our application. Therefore, we focus on an ML-based approach, Multi-Directional Recurrent Neural Network (M-RNN). M-RNN utilizes both temporal and spatial characteristics of the data. We evaluate the effectiveness of this approach on a TomTom dataset containing spatio-temporal measurements of average vehicle speed and travel time in the Greater Toronto Area (GTA). We evaluate the method under various conditions, where the results demonstrate that M-RNN outperforms existing solutions,e.g., spline interpolation and matrix completion, by up to 58% decreases in Root Mean Square Error (RMSE).
△ Less
Submitted 9 January, 2021;
originally announced January 2021.
-
Energy Efficiency Through Joint Routing and Function Placement in Different Modes of SDN/NFV Networks
Authors:
Reza Moosavi,
Saeedeh Parsaeefard,
Mohammad Ali Maddah-Ali,
Vahid Shah-Mansouri,
Babak Hossein Khalaj,
Mehdi Bennis
Abstract:
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during…
▽ More
Network function virtualization (NFV) and software defined networking (SDN) are two promising technologies to enable 5G and 6G services and achieve cost reduction, network scalability, and deployment flexibility.
However, migration to full SDN/NFV networks in order to serve these services is a time consuming process and costly for mobile operators. This paper focuses on energy efficiency during the transition of mobile core networks (MCN) to full SDN/NFV networks, and explores how energy efficiency can be addressed during such migration. We propose a general system model containing a combination of legacy nodes and links, in addition to newly introduced NFV and SDN nodes. We refer to this system model as partial SDN and hybrid NFV MCN which can cover different modes of SDN and NFV implementations. Based on this framework, we formulate energy efficiency by considering joint routing and function placement in the network. Since this problem belongs to the class of non-linear integer programming problems, to solve it efficiently, we present a modified Viterbi algorithm (MVA) based on multi-stage graph modeling and a modified Dijkstra's algorithm. We simulate this algorithm for a number of network scenarios with different fractions of NFV and SDN nodes, and evaluate how much energy can be saved through such transition. Simulation results confirm the expected performance of the algorithm which saves up to 70% energy compared to network where all nodes are always on. Interestingly, the amount of energy saved by the proposed algorithm in the case of hybrid NFV and partial SDN networks can reach up to 60-90% of the saved energy in full NFV/SDN networks.
△ Less
Submitted 17 October, 2020; v1 submitted 26 July, 2020;
originally announced July 2020.
-
Representation of Federated Learning via Worst-Case Robust Optimization Theory
Authors:
Saeedeh Parsaeefard,
Iman Tabrizian,
Alberto Leon Garcia
Abstract:
Federated learning (FL) is a distributed learning approach where a set of end-user devices participate in the learning process by acting on their isolated local data sets. Here, we process local data sets of users where worst-case optimization theory is used to reformulate the FL problem where the impact of local data sets in training phase is considered as an uncertain function bounded in a close…
▽ More
Federated learning (FL) is a distributed learning approach where a set of end-user devices participate in the learning process by acting on their isolated local data sets. Here, we process local data sets of users where worst-case optimization theory is used to reformulate the FL problem where the impact of local data sets in training phase is considered as an uncertain function bounded in a closed uncertainty region. This representation allows us to compare the performance of FL with its centralized counterpart, and to replace the uncertain function with a concept of protection functions leading to more tractable formulation. The latter supports applying a regularization factor in each user cost function in FL to reach a better performance. We evaluated our model using the MNIST data set versus the protection function parameters, e.g., regularization factors.
△ Less
Submitted 11 December, 2019;
originally announced December 2019.
-
Power-Efficient Resource Allocation in Massive MIMO Aided Cloud RANs
Authors:
Nahid Amani,
Saeedeh Parsaeefard,
Hassan Taheri,
Hossein Pedram
Abstract:
This paper considers the power-efficient resource allocation problem in a cloud radio access network (C-RAN). The C-RAN architecture consists of a set of base-band units (BBUs) which are connected to a set of radio remote heads (RRHs) equipped with massive multiple input multiple output (MIMO), via fronthaul links with limited capacity. We formulate the power-efficient optimization problem in C-RA…
▽ More
This paper considers the power-efficient resource allocation problem in a cloud radio access network (C-RAN). The C-RAN architecture consists of a set of base-band units (BBUs) which are connected to a set of radio remote heads (RRHs) equipped with massive multiple input multiple output (MIMO), via fronthaul links with limited capacity. We formulate the power-efficient optimization problem in C-RANs as a joint resource allocation problem in order to jointly allocate the RRH and transmit power to each user, and fronthaul links and BBUs assign to active RRHs while satisfying the minimum required rate of each user. To solve this non-convex optimization problem we suggest iterative algorithm with two-step based on the complementary geometric programming (CGP) and the successive convex approximation (SCA). The simulation results indicate that our proposed scheme can significantly reduce the total transmission power by switching off the under-utilized RRHs.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Artificial Intelligence as a Services (AI-aaS) on Software-Defined Infrastructure
Authors:
Saeedeh Parsaeefard,
Iman Tabrizian,
Alberto Leon-Garcia
Abstract:
This paper investigates a paradigm for offering artificial intelligence as a service (AI-aaS) on software-defined infrastructures (SDIs). The increasing complexity of networking and computing infrastructures is already driving the introduction of automation in networking and cloud computing management systems. Here we consider how these automation mechanisms can be leveraged to offer AI-aaS. Use c…
▽ More
This paper investigates a paradigm for offering artificial intelligence as a service (AI-aaS) on software-defined infrastructures (SDIs). The increasing complexity of networking and computing infrastructures is already driving the introduction of automation in networking and cloud computing management systems. Here we consider how these automation mechanisms can be leveraged to offer AI-aaS. Use cases for AI-aaS are easily found in addressing smart applications in sectors such as transportation, manufacturing, energy, water, air quality, and emissions. We propose an architectural scheme based on SDIs where each AI-aaS application is comprised of a monitoring, analysis, policy, execution plus knowledge (MAPE-K) loop (MKL). Each application is composed as one or more specific service chains embedded in SDI, some of which will include a Machine Learning (ML) pipeline. Our model includes a new training plane and an AI-aaS plane to deal with the model-development and operational phases of AI applications. We also consider the role of an ML/MKL sandbox in ensuring coherency and consistency in the operation of multiple parallel MKL loops. We present experimental measurement results for three AI-aaS applications deployed on the SAVI testbed: 1. Compressing monitored data in SDI using autoencoders; 2. Traffic monitoring to allocate CPUs resources to VNFs; and 3. Highway segment classification in smart transportation.
△ Less
Submitted 11 July, 2019;
originally announced July 2019.
-
Resource Management and Admission Control for Tactile Internet in Next Generation of RAN
Authors:
Narges Gholipoor,
Saeedeh Parsaeefard,
Mohammad Reza Javan,
Nader Mokari,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) technology. This model includes both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays and reliability for each end to e…
▽ More
In this paper, a new queuing model for the Tactile Internet (TI) is proposed for the cloud radio access network (C-RAN) architecture of the next generation wireless networks, e.g., 5G, assisted via orthogonal frequency division multiple access (OFDMA) technology. This model includes both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays and reliability for each end to end (E2E) connection between each pair of tactile users. For this setup, with the aim to minimize the transmit power of users subject to guaranteeing tolerable delay of users, and fronthaul and access limitations, we formulate a resource allocation problem. Since the proposed optimization problem is highly non-convex, to solve it in an efficient manner, we utilize diverse transformation techniques such as successive convex approximation (SCA) and difference of two convex functions (DC). In addition, we propose an admission control (AC) algorithm to make problem feasible. In our proposed system model, we dynamically adjust the fronthaul and access links to minimize the transmit power. Simulation results reveal that by dynamic adjustment of the access and fronthaul delays, transmit power can be saved compared to the case of fixed approach per each transmission session. Moreover, the number of rejected users in the network is significantly reduced and more users are accepted.
△ Less
Submitted 8 November, 2019; v1 submitted 30 June, 2019;
originally announced July 2019.
-
Robust Radio Resource Allocation in MISO-SCMA Assisted C-RAN in 5G Networks
Authors:
Mohammad. Moltafet,
Saeedeh. Parsaeefard,
Mohammad R. Javan,
Nader. Mokari
Abstract:
In this paper, by considering multiple slices, a downlink transmission of a sparse code multiple access (SCMA) based cloud-radio access network (C-RAN) is investigated. In this regard, by supposing multiple input and single output (MISO) transmission technology, a novel robust radio resource allocation is proposed where considering uncertain channel state information (CSI), the worst case approach…
▽ More
In this paper, by considering multiple slices, a downlink transmission of a sparse code multiple access (SCMA) based cloud-radio access network (C-RAN) is investigated. In this regard, by supposing multiple input and single output (MISO) transmission technology, a novel robust radio resource allocation is proposed where considering uncertain channel state information (CSI), the worst case approach is applied. The main goal of the proposed radio resource allocation is to, maximize the system sum rate with maximum available power at radio remote head (RRH), minimum rate requirement of each slice, maximum frounthaul capacity of each RRH, user association, and SCMA constraints. To solve the proposed optimization problem in an efficient manner, an iterative method is deployed where in each iteration, beamforming and joint codebook allocation and user association subproblem are solved separately. By introducing some auxiliary variables, the joint codebook allocation and user association subproblem is transformed into an integer linear programming, and to solve the beamforming optimization problem, minorization-maximization algorithm (MMA) is applied. Via numerical results, the performance of the proposed system model versus different system parameters and for different channel models are investigated.
△ Less
Submitted 6 February, 2019;
originally announced February 2019.
-
Cloud-based Queuing Model for Tactile Internet in Next Generation of RAN
Authors:
Narges Gholipoor,
Saeedeh Parsaeefard,
Mohammad Reza Javan,
Nader Mokari,
Hamid Saeedi,
Hossein Pishro-Nik
Abstract:
Ultra-low latency is the most important requirement of the Tactile Internet (TI), which is one of the proposed services for the next-generation wireless network (NGWN), e.g., fifth generation (5G) network. In this paper, a new queuing model for the TI is proposed for the cloud radio access network (CRAN) architecture of the NGWN by applying power domain non-orthogonal multiple access (PD-NOMA) tec…
▽ More
Ultra-low latency is the most important requirement of the Tactile Internet (TI), which is one of the proposed services for the next-generation wireless network (NGWN), e.g., fifth generation (5G) network. In this paper, a new queuing model for the TI is proposed for the cloud radio access network (CRAN) architecture of the NGWN by applying power domain non-orthogonal multiple access (PD-NOMA) technology. In this model, we consider both the radio remote head (RRH) and baseband processing unit (BBU) queuing delays for each end-to-end (E2E) connection between a pair of tactile users. In our setup, to minimize the transmit power of users subject to guaranteeing an acceptable delay of users, and fronthaul and access constraints, we formulate a resource allocation (RA) problem. Furthermore, we dynamically set the fronthaul and access links to minimize the total transmit power. Given that the proposed RA problem is highly non-convex, in order to solve it, we utilize diverse transformation techniques such as successive convex approximation (SCA) and difference of two convex functions (DC). Numerical results show that by dynamic adjustment of the access and fronthaul delays, transmit power reduces in comparison with the fixed approach per each connection. Also, energy efficiency of orthogonal frequency division multiple access (OFDMA) and PD-NOMA are compared for our setup.
△ Less
Submitted 8 November, 2019; v1 submitted 27 January, 2019;
originally announced January 2019.
-
Optimum Transmission Delay for Function Computation in NFV-based Networks: the role of Network Coding and Redundant Computing
Authors:
Behrooz Tahmasebi,
Mohammad Ali Maddah-Ali,
Saeedeh Parsaeefard,
Babak Hossein Khalaj
Abstract:
In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function.…
▽ More
In this paper, we study the problem of delay minimization in NFV-based networks. In such systems, the ultimate goal of any request is to compute a sequence of functions in the network, where each function can be computed at only a specific subset of network nodes. In conventional approaches, for each function, we choose one node from the corresponding subset of the nodes to compute that function. In contrast, in this work, we allow each function to be computed in more than one node, redundantly in parallel, to respond to a given request. We argue that such redundancy in computation not only improves the reliability of the network, but would also, perhaps surprisingly, reduce the overall transmission delay. In particular, we establish that by judiciously choosing the subset of nodes which compute each function, in conjunction with a linear network coding scheme to deliver the result of each computation, we can characterize and achieve the optimal end-to-end transmission delay. In addition, we show that using such technique, we can significantly reduce the transmission delay as compared to the conventional approach. In some scenarios, such reduction can even scale with the size of the network. More precisely, by increasing the number of nodes that can compute the given function in parallel by a multiplicative factor, the end-to-end delay will also decrease by the same factor. Moreover, we show that while finding the subset of nodes for each computation, in general, is a complex integer program, approximation algorithms can be proposed to reduce the computational complexity. In fact, for the case where the number of computing nodes for a given function is upper-bounded by a constant, a dynamic programming scheme can be proposed to find the optimum subsets in polynomial times. Our numerical simulations confirm the achieved gain in performance in comparison with conventional approaches.
△ Less
Submitted 11 September, 2018; v1 submitted 9 July, 2018;
originally announced July 2018.
-
Cooperative Multi-Bitrate Video Caching and Transcoding in Multicarrier NOMA-Assisted Heterogeneous Virtualized MEC Networks
Authors:
Sepehr Rezvani,
Saeedeh Parsaeefard,
Nader Mokari,
Mohammad R. Javan,
Halim Yanikomeroglu
Abstract:
Cooperative video caching and transcoding in mobile edge computing (MEC) networks is a new paradigm for future wireless networks, e.g., 5G and 5G beyond, to reduce scarce and expensive backhaul resource usage by prefetching video files within radio access networks (RANs). Integration of this technique with other advent technologies, such as wireless network virtualization and multicarrier non-orth…
▽ More
Cooperative video caching and transcoding in mobile edge computing (MEC) networks is a new paradigm for future wireless networks, e.g., 5G and 5G beyond, to reduce scarce and expensive backhaul resource usage by prefetching video files within radio access networks (RANs). Integration of this technique with other advent technologies, such as wireless network virtualization and multicarrier non-orthogonal multiple access (MC-NOMA), provides more flexible video delivery opportunities, which leads to enhancements both for the network's revenue and for the end-users' service experience. In this regard, we propose a two-phase RAF for a parallel cooperative joint multi-bitrate video caching and transcoding in heterogeneous virtualized MEC networks. In the cache placement phase, we propose novel proactive delivery-aware cache placement strategies (DACPSs) by jointly allocating physical and radio resources based on network stochastic information to exploit flexible delivery opportunities. Then, for the delivery phase, we propose a delivery policy based on the user requests and network channel conditions. The optimization problems corresponding to both phases aim to maximize the total revenue of network slices, i.e., virtual networks. Both problems are non-convex and suffer from high-computational complexities. For each phase, we show how the problem can be solved efficiently. We also propose a low-complexity RAF in which the complexity of the delivery algorithm is significantly reduced. A Delivery-aware cache refreshment strategy (DACRS) in the delivery phase is also proposed to tackle the dynamically changes of network stochastic information. Extensive numerical assessments demonstrate a performance improvement of up to 30% for our proposed DACPSs and DACRS over traditional approaches.
△ Less
Submitted 14 April, 2019; v1 submitted 18 May, 2018;
originally announced May 2018.
-
Leveraging Synergy of 5G SDWN and Multi-Layer Resource Management for Network Optimization
Authors:
Mahsa Derakhshani,
Saeedeh Parsaeefard,
Tho Le-Ngoc,
Alberto Leon-Garcia
Abstract:
Fifth-generation (5G) cellular wireless networks are envisioned to predispose service-oriented, flexible, and spectrum/energy-efficient edge-to-core infrastructure, aiming to offer diverse applications. Convergence of software-defined networking (SDN), software-defined radio (SDR) compatible with multiple radio access technologies (RATs), and virtualization on the concept of 5G software-defined wi…
▽ More
Fifth-generation (5G) cellular wireless networks are envisioned to predispose service-oriented, flexible, and spectrum/energy-efficient edge-to-core infrastructure, aiming to offer diverse applications. Convergence of software-defined networking (SDN), software-defined radio (SDR) compatible with multiple radio access technologies (RATs), and virtualization on the concept of 5G software-defined wireless networking (5G-SDWN) is a promising approach to provide such a dynamic network. The principal technique behind the 5G-SDWN framework is the separation of the control and data planes, from the deep core entities to edge wireless access points (APs). This separation allows the abstraction of resources as transmission parameters of each user over the 5G-SDWN. In this user-centric and service-oriented environment, resource management plays a critical role to achieve efficiency and reliability. However, it is natural to wonder if 5G-SDWN can be leveraged to enable converged multi-layer resource management over the portfolio of resources, and reciprocally, if CML resource management can effectively provide performance enhancement and reliability for 5G-SDWN. We believe that replying to these questions and investigating this mutual synergy are not trivial, but multidimensional and complex for 5G-SDWN, which consists of different technologies and also inherits legacy generations of wireless networks. In this paper, we propose a flexible protocol structure based on three mentioned pillars for 5G-SDWN, which can handle all the required functionalities in a more crosslayer manner. Based on this, we demonstrate how the general framework of CML resource management can control the end user quality of experience. For two scenarios of 5G-SDWN, we investigate the effects of joint user-association and resource allocation via CML resource management to improve performance in a virtualized network.
△ Less
Submitted 29 February, 2016;
originally announced February 2016.
-
Joint User-Association and Resource-Allocation in Virtualized Wireless Networks
Authors:
Saeedeh Parsaeefard,
Rajesh Dawadi,
Mahsa Derakhshani,
Tho Le-Ngoc
Abstract:
In this paper, we consider a down-link transmission of multicell virtualized wireless networks (VWNs) where users of different service providers (slices) within a specific region are served by a set of base stations (BSs) through orthogonal frequency division multiple access (OFDMA). In particular, we develop a joint BS assignment, sub-carrier and power allocation algorithm to maximize the network…
▽ More
In this paper, we consider a down-link transmission of multicell virtualized wireless networks (VWNs) where users of different service providers (slices) within a specific region are served by a set of base stations (BSs) through orthogonal frequency division multiple access (OFDMA). In particular, we develop a joint BS assignment, sub-carrier and power allocation algorithm to maximize the network throughput, while satisfying the minimum required rate of each slice. Under the assumption that each user at each transmission instance can connect to no more than one BS, we introduce the user-association factor (UAF) to represent the joint sub-carrier and BS assignment as the optimization variable vector in the mathematical problem formulation. Sub-carrier reuse is allowed in different cells, but not within one cell. As the proposed optimization problem is inherently non-convex and NP-hard, by applying the successive convex approximation (SCA) and complementary geometric programming (CGP), we develop an efficient two-step iterative approach with low computational complexity to solve the proposed problem. For a given power-allocation, Step 1 derives the optimum userassociation and subsequently, for an obtained user-association, Step 2 find the optimum power-allocation. Simulation results demonstrate that the proposed iterative algorithm outperforms the traditional approach in which each user is assigned to the BS with the largest average value of signal strength, and then, joint sub-carrier and power allocation is obtained for the assigned users of each cell. Especially, for the cell-edge users, simulation results reveal a coverage improvement up to 57% and 71% for uniform and non-uniform users distribution, respectively leading to more reliable transmission and higher spectrum efficiency for VWN.
△ Less
Submitted 25 August, 2015;
originally announced August 2015.
-
Full-Duplex Relay with Jamming Protocol for Improving Physical-Layer Security
Authors:
Saeedeh Parsaeefard,
Tho Le-Ngoc
Abstract:
This paper proposes a jointly cooperative relay and jamming protocol based on full-duplex (FD) capable relay to increase the source-destination secrecy rate in the presence of different types of eavesdroppers. In this so called \textit{FD-Relay with jamming (FDJ)} protocol, the FD-Relay, first, simultaneously receives data and sends jamming to the eavesdropper, and, then, forwards the data, while…
▽ More
This paper proposes a jointly cooperative relay and jamming protocol based on full-duplex (FD) capable relay to increase the source-destination secrecy rate in the presence of different types of eavesdroppers. In this so called \textit{FD-Relay with jamming (FDJ)} protocol, the FD-Relay, first, simultaneously receives data and sends jamming to the eavesdropper, and, then, forwards the data, while the source jams the eavesdropper. Achievable secrecy rates of the proposed FDJ in presence of different eavesdropper types and self-interference (SI) are derived and compared with those of the traditional half-duplex (HD) relay. The adaptive power allocation for secrecy rate maximization in a multi-carrier scenario for both proposed FDJ and HD-Relay is formulated as a non-convex optimization problem and corresponding iterative solution algorithm is developed using the difference-of-two-concave-functions (DC) programming technique. The simulation results confirm that FDJ offers significant improvements in the secrecy rate over the HD-Relay.
△ Less
Submitted 8 September, 2014;
originally announced September 2014.
-
Robust Stackelberg game in communication systems
Authors:
saeedeh parsaeefard,
Mihaela van der Schaar,
Ahmad R. Sharafat
Abstract:
This paper studies multi-user communication systems with two groups of users: leaders which possess system information, and followers which have no system information using the formulation of Stackelberg games. In such games, the leaders play and choose their actions based on their information about the system and the followers choose their actions myopically according to their observations of the…
▽ More
This paper studies multi-user communication systems with two groups of users: leaders which possess system information, and followers which have no system information using the formulation of Stackelberg games. In such games, the leaders play and choose their actions based on their information about the system and the followers choose their actions myopically according to their observations of the aggregate impact of other users. However, obtaining the exact value of these parameters is not practical in communication systems. To study the effect of uncertainty and preserve the players' utilities in these conditions, we introduce a robust equilibrium for Stackelberg games. In this framework, the leaders' information and the followers' observations are uncertain parameters, and the leaders and the followers choose their actions by solving the worst-case robust optimizations. We show that the followers' uncertain parameters always increase the leaders' utilities and decrease the followers' utilities. Conversely, the leaders' uncertain information reduces the leaders' utilities and increases the followers' utilities. We illustrate our theoretical results with the numerical results obtained based on the power control games in the interference channels.
△ Less
Submitted 25 August, 2011;
originally announced August 2011.
-
Robust Spectrum Sharing via Worst Case Approach
Authors:
Saeedeh Parsaeefard,
Ahmad R. Sharafat
Abstract:
This paper considers non-cooperative and fully-distributed power-allocation for secondary-users (SUs) in spectrum-sharing environments when normalized-interference to each secondary-user is uncertain. We model each uncertain parameter by the sum of its nominal (estimated) value and a bounded additive error in a convex set, and show that the allocated power always converges to its equilibrium, call…
▽ More
This paper considers non-cooperative and fully-distributed power-allocation for secondary-users (SUs) in spectrum-sharing environments when normalized-interference to each secondary-user is uncertain. We model each uncertain parameter by the sum of its nominal (estimated) value and a bounded additive error in a convex set, and show that the allocated power always converges to its equilibrium, called robust Nash equilibrium (RNE). In the case of a bounded and symmetric uncertainty set, we show that the power allocation problem for each SU is simplified, and can be solved in a distributed manner. We derive the conditions for RNE's uniqueness and for convergence of the distributed algorithm; and show that the total throughput (social utility) is less than that at NE when RNE is unique. We also show that for multiple RNEs, the the social utility may be higher at a RNE as compared to that at the corresponding NE, and demonstrate that this is caused by SUs' orthogonal utilization of bandwidth for increasing the social utility. Simulations confirm our analysis.
△ Less
Submitted 24 March, 2011;
originally announced March 2011.
-
Robust Additively Coupled Games
Authors:
Saeedeh Parsaeefard,
Ahmad R. Sharafat,
Mihaela van der Schaar
Abstract:
We study the robust Nash equilibrium (RNE) for a class of games in communications systems and networks where the impact of users on each other is an additive function of their strategies. Each user measures this impact, which may be corrupted by uncertainty in feedback delays, estimation errors, movements of users, etc. To study the outcome of the game in which such uncertainties are encountered,…
▽ More
We study the robust Nash equilibrium (RNE) for a class of games in communications systems and networks where the impact of users on each other is an additive function of their strategies. Each user measures this impact, which may be corrupted by uncertainty in feedback delays, estimation errors, movements of users, etc. To study the outcome of the game in which such uncertainties are encountered, we utilize the worst-case robust optimization theory. The existence and uniqueness conditions of RNE are derived using finite-dimensions variational inequalities. To describe the effect of uncertainty on the performance of the system, we use two criteria measured at the RNE and at the equilibrium of the game without uncertainty. The first is the difference between the respective social utility of users and, the second is the differences between the strategies of users at their respective equilibria. These differences are obtained for the case of a unique NE and multiple NEs. To reach the RNE, we propose a distributed algorithm based on the proximal response map and derive the conditions for its convergence. Simulations of the power control game in interference channels, and Jackson networks validate our analysis.
△ Less
Submitted 29 August, 2011; v1 submitted 24 March, 2011;
originally announced March 2011.