-
Graph Convolutional Reinforcement Learning for Collaborative Queuing Agents
Authors:
Hassan Fawaz,
Julien Lesca,
Pham Tran Anh Quang,
Jérémie Leguay,
Djamal Zeghlache,
Paolo Medagliani
Abstract:
In this paper, we explore the use of multi-agent deep learning as well as learning to cooperate principles to meet stringent service level agreements, in terms of throughput and end-to-end delay, for a set of classified network flows. We consider agents built on top of a weighted fair queuing algorithm that continuously set weights for three flow groups: gold, silver, and bronze. We rely on a nove…
▽ More
In this paper, we explore the use of multi-agent deep learning as well as learning to cooperate principles to meet stringent service level agreements, in terms of throughput and end-to-end delay, for a set of classified network flows. We consider agents built on top of a weighted fair queuing algorithm that continuously set weights for three flow groups: gold, silver, and bronze. We rely on a novel graph-convolution based, multi-agent reinforcement learning approach known as DGN. As benchmarks, we propose centralized and distributed deep Q-network approaches and evaluate their performances in different network, traffic, and routing scenarios, highlighting the effectiveness of our proposals and the importance of agent cooperation. We show that our DGN-based approach meets stringent throughput and delay requirements across all scenarios.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Dynamic Link Network Emulation: a Model-based Design
Authors:
Erick Petersen,
Jorge López,
Natalia Kushik,
Claude Poletti,
Djamal Zeghlache
Abstract:
This paper presents the design and architecture of a network emulator whose links' parameters (such as delay and bandwidth) vary at different time instances. The emulator can thus be used in order to test and evaluate novel solutions for such networks, before their final deployment. To achieve this goal, different existing technologies are carefully combined to emulate link dynamicity, automatic t…
▽ More
This paper presents the design and architecture of a network emulator whose links' parameters (such as delay and bandwidth) vary at different time instances. The emulator can thus be used in order to test and evaluate novel solutions for such networks, before their final deployment. To achieve this goal, different existing technologies are carefully combined to emulate link dynamicity, automatic traffic generation, and overall network device emulation. The emulator takes as an input a formal model of the network to emulate and configures all required software to execute live software instances of the desired network components, in the requested topology. We devote our study to the so-called dynamic link networks, with potentially asymmetric links. Since emulating asymmetric dynamic links is far from trivial (even with the existing state-of-the-art tools), we provide a detailed design architecture that allows this. As a case study, a satellite network emulation is presented. Experimental results show the precision of our dynamic assignments and the overall flexibility of the proposed solution.
△ Less
Submitted 4 March, 2022; v1 submitted 15 July, 2021;
originally announced July 2021.
-
On using SMT-solvers for Modeling and Verifying Dynamic Network Emulators
Authors:
Erick Petersen,
Jorge López,
Natalia Kushik,
Claude Poletti,
Djamal Zeghlache
Abstract:
A novel model-based approach to verify dynamic networks is proposed; the approach consists in formally describing the network topology and dynamic link parameters. A many sorted first order logic formula is constructed to check the model with respect to a set of properties. The network consistency is verified using an SMT-solver, and the formula is used for the run-time network verification when a…
▽ More
A novel model-based approach to verify dynamic networks is proposed; the approach consists in formally describing the network topology and dynamic link parameters. A many sorted first order logic formula is constructed to check the model with respect to a set of properties. The network consistency is verified using an SMT-solver, and the formula is used for the run-time network verification when a given static network instance is implemented. The z3 solver is used for this purpose and corresponding preliminary experiments showcase the expressiveness and current limitations of the proposed approach.
△ Less
Submitted 13 October, 2020; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Mandate-driven Networking Eco-system: A Paradigm Shift in End-to-End Communications
Authors:
Ingrid Moerman,
Djamal Zeghlache,
Adnan Shahid,
Joao F. Santos,
Luiz A. DaSilva,
Klaus David,
John Farserotu,
Ad de Ridder,
Wei Liu,
Jeroen Hoebeke
Abstract:
The wireless industry is driven by key stakeholders that follow a holistic approach of "one-system-fits-all" that leads to moving network functionality of meeting stringent E2E communication requirements towards the core and cloud infrastructures. This trend is limiting smaller and new players for bringing in new and novel solutions. For meeting these E2E requirements, tenants and end-users need t…
▽ More
The wireless industry is driven by key stakeholders that follow a holistic approach of "one-system-fits-all" that leads to moving network functionality of meeting stringent E2E communication requirements towards the core and cloud infrastructures. This trend is limiting smaller and new players for bringing in new and novel solutions. For meeting these E2E requirements, tenants and end-users need to be active players for bringing their needs and innovations. Driving E2E communication not only in terms of QoS but also overall carbon footprint and spectrum efficiency from one specific community may lead to undesirable simplifications and a higher level of abstraction of other network segments may lead to sub-optimal operations. Based on this, the paper presents a paradigm shift that will enlarge the role of wireless innovation at academia, SME's, industries and start-ups while taking into account decentralized mandate-driven intelligence in E2E communications
△ Less
Submitted 6 March, 2020; v1 submitted 26 February, 2020;
originally announced February 2020.
-
Identifying Operational Data-paths in Software Defined Networking Driven Data-planes
Authors:
José Reyes,
Jorge López,
Djamal Zeghlache
Abstract:
In this paper, we propose an approach that relies on distributed traffic generation and monitoring to identify the operational data-paths in a given Software Defined Networking (SDN) driven data-plane. We show that under certain assumptions, there exist necessary and sufficient conditions for formally guaranteeing that all operational data-paths are discovered using our approach. In order to provi…
▽ More
In this paper, we propose an approach that relies on distributed traffic generation and monitoring to identify the operational data-paths in a given Software Defined Networking (SDN) driven data-plane. We show that under certain assumptions, there exist necessary and sufficient conditions for formally guaranteeing that all operational data-paths are discovered using our approach. In order to provide reliable communication within the SDN driven data-planes, assuring that the implemented data-paths are the requested (and expected) ones is necessary. This requires discovering the actual operational (running) data-paths in the data-plane. In SDN, different applications may configure different coexisting data-paths, the resulting data-paths a specific network flow traverses may not be the intended ones. Furthermore, the SDN components may be defected or compromised. We focus on discovering the operational data-paths on SDN driven data-planes. However, the proposed approach is applicable to any data-plane where the operational data-paths must be verified and / or certified. A data-path discovery toolkit has been implemented. We describe the corresponding set of tools, and showcase the obtained experimental results that reveal inconsistencies in well-known SDN applications.
△ Less
Submitted 7 June, 2019;
originally announced June 2019.
-
Preventive Model-based Verification and Repairing for SDN Requests
Authors:
Igor Burdonov,
Alexandre Kossachev,
Nina Yevtushenko,
Jorge López,
Natalia Kushik,
Djamal Zeghlache
Abstract:
Software Defined Networking (SDN) is a novel network management technology, which currently attracts a lot of attention due to the provided capabilities. Recently, different works have been devoted to testing / verifying the (correct) configurations of SDN data planes. In general, SDN forwarding devices (e.g., switches) route (steer) traffic according to the configured flow rules; the latter ident…
▽ More
Software Defined Networking (SDN) is a novel network management technology, which currently attracts a lot of attention due to the provided capabilities. Recently, different works have been devoted to testing / verifying the (correct) configurations of SDN data planes. In general, SDN forwarding devices (e.g., switches) route (steer) traffic according to the configured flow rules; the latter identifies the set of virtual paths implemented in the data plane. In this paper, we propose a novel preventive approach for verifying that no misconfigurations (e.g., infinite loops), can occur given the requested set of paths. We discuss why such verification is essential, namely, how, when synthesizing a set of data paths, other not requested and undesired data paths (including loops) may be unintentionally configured. Furthermore, we show that for some cases the requested set of paths cannot be implemented without adding such undesired behavior, i.e., only a superset of the requested set can be implemented. Correspondingly, we present a verification technique for detecting such issues of potential misconfigurations and estimate the complexity of the proposed method; its polynomial complexity highlights the applicability of the obtained results. Finally, we propose a technique for debugging and repairing a set of paths in such a way that the corrected set does not induce undesired paths into the data plane, if the latter is possible.
△ Less
Submitted 21 September, 2020; v1 submitted 7 June, 2019;
originally announced June 2019.
-
Two Design Issues in Cognitive Sub-Small Cell for Sojourners
Authors:
Xin Jin,
Abdelwaheb Marzouki,
Djamal Zeghlache,
Linghe Kong,
Athanasios V. Vasilakos
Abstract:
In this paper, we propound a solution named Cognitive Sub-Small Cell for Sojourners (CSCS) in allusion to a broadly representative small cell scenario, where users can be categorized into two groups: sojourners and inhabitants. CSCS contributes to save energy, enhance the number of concurrently supportable users and enshield inhabitants. We consider two design issues in CSCS: i) determining the nu…
▽ More
In this paper, we propound a solution named Cognitive Sub-Small Cell for Sojourners (CSCS) in allusion to a broadly representative small cell scenario, where users can be categorized into two groups: sojourners and inhabitants. CSCS contributes to save energy, enhance the number of concurrently supportable users and enshield inhabitants. We consider two design issues in CSCS: i) determining the number of transmit antennas on sub-small cell APs; ii) controlling downlink inter-sub-small cell interference. For issue i), we excogitate an algorithm helped by the probability distribution of the number of concurrent sojourners. For issue ii), we propose an interference control scheme named BDBF: Block Diagonalization (BD) Precoding based on uncertain channel state information in conjunction with auxiliary optimal Beamformer (BF). In the simulation, we delve into the issue: how the factors impact the number of transmit antennas on sub-small cell APs. Moreover, we verify a significant conclusion: Using BDBF gains more capacity than using optimal BF alone within a bearably large radius of uncertainty region.
△ Less
Submitted 30 July, 2013; v1 submitted 8 January, 2013;
originally announced January 2013.
-
Quantifying Spatiotemporal Stability by means of Entropy: Approach and Motivations
Authors:
Mohamed-Haykel Zayani,
Vincent Gauthier,
Djamal Zeghlache
Abstract:
Several studies demonstrate that there are critical differences between real wireless networks and simulation models. This finding has permitted to extract spatial and temporal properties for links and to provide efficient methods as biased link sampling to guarantee efficient routing structure. Other works have focused on computing metrics to improve routing, specially the reuse of the measure of…
▽ More
Several studies demonstrate that there are critical differences between real wireless networks and simulation models. This finding has permitted to extract spatial and temporal properties for links and to provide efficient methods as biased link sampling to guarantee efficient routing structure. Other works have focused on computing metrics to improve routing, specially the reuse of the measure of entropy. From there, rises the idea of formulating a new measure of entropy that gives an overview of the spatiotemporal stability of a link. This measure will rely on spatial and temporal properties of links and fed with the efficiency of biased link sampling.
△ Less
Submitted 11 July, 2012;
originally announced July 2012.
-
Tracking Topology Dynamicity for Link Prediction in Intermittently Connected Wireless Networks
Authors:
Mohamed-Haykel Zayani,
Vincent Gauthier,
Ines Slama,
Djamal Zeghlache
Abstract:
Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in the network protocols design, e.g. to identify th…
▽ More
Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in the network protocols design, e.g. to identify the closeness degree between two nodes. In this paper, we propose a temporal link prediction technique for DTN which quantifies the behavior similarity between each pair of nodes and makes use of it to predict future links. We attest that the tensor-based technique is effective for temporal link prediction applied to the intermittently connected networks. The validity of this method is proved when the prediction is made in a distributed way (i.e. with local information) and its performance is compared to well-known link prediction metrics proposed in the literature.
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
Cooperation Enforcement for Packet Forwarding Optimization in Multi-hop Ad-hoc Networks
Authors:
Mohamed-Haykel Zayani,
Djamal Zeghlache
Abstract:
Ad-hoc networks are independent of any infrastructure. The nodes are autonomous and make their own decisions. They also have limited energy resources. Thus, a node tends to behave selfishly when it is asked to forward the packets of other nodes. Indeed, it would rather choose to reject a forwarding request in order to save its energy. To overcome this problem, the nodes need to be motivated to coo…
▽ More
Ad-hoc networks are independent of any infrastructure. The nodes are autonomous and make their own decisions. They also have limited energy resources. Thus, a node tends to behave selfishly when it is asked to forward the packets of other nodes. Indeed, it would rather choose to reject a forwarding request in order to save its energy. To overcome this problem, the nodes need to be motivated to cooperate. To this end, we propose a self-learning repeated game framework to enforce cooperation between the nodes of a network. This framework is inspired by the concept of "The Weakest Link" TV game. Each node has a utility function whose value depends on its cooperation in forwarding packets on a route as well as the cooperation of all the nodes that form this same route. The more these nodes cooperate the higher is their utility value. This would establish a cooperative spirit within the nodes of the networks. All the nodes will then more or less equally participate to the forwarding tasks which would then eventually guarantee a more efficient packets forwarding from sources to respective destinations. Simulations are run and the results show that the proposed framework efficiently enforces nodes to cooperate and outperforms two other self-learning repeated game frameworks which we are interested in.
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
Improving Link Prediction in Intermittently Connected Wireless Networks by Considering Link and Proximity Stabilities
Authors:
Mohamed-Haykel Zayani,
Vincent Gauthier,
Djamal Zeghlache
Abstract:
Several works have outlined the fact that the mobility in intermittently connected wireless networks is strongly governed by human behaviors as they are basically human-centered. It has been shown that the users' moves can be correlated and that the social ties shared by the users highly impact their mobility patterns and hence the network structure. Tracking these correlations and measuring the s…
▽ More
Several works have outlined the fact that the mobility in intermittently connected wireless networks is strongly governed by human behaviors as they are basically human-centered. It has been shown that the users' moves can be correlated and that the social ties shared by the users highly impact their mobility patterns and hence the network structure. Tracking these correlations and measuring the strength of social ties have led us to propose an efficient distributed tensor-based link prediction technique. In fact, we are convinced that the feedback provided by such a prediction mechanism can enhance communication protocols such as opportunistic routing protocols. In this paper, we aim to bring out that measuring the stabilities of the link and the proximity at two hops can improve the efficiency of the proposed link prediction technique. To quantify these two parameters, we propose an entropy estimator in order to measure the two stability aspects over successive time periods. Then, we join these entropy estimations to the tensor-based link prediction framework by designing new prediction metrics. To assess the contribution of these entropy estimations in the enhancement of tensor-based link prediction efficiency, we perform prediction on two real traces. Our simulation results show that by exploiting the information corresponding to the link stability and/or to the proximity stability, the performance of the tensor-based link prediction technique is improved. Moreover, the results attest that our proposal's ability to outperform other well-known prediction metrics.
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
A Joint Model for IEEE 802.15.4 Physical and Medium Access Control Layers
Authors:
Mohamed-Haykel Zayani,
Vincent Gauthier,
Djamal Zeghlache
Abstract:
Many studies have tried to evaluate wireless networks and especially the IEEE 802.15.4 standard. Hence, several papers have aimed to describe the functionalities of the physical (PHY) and medium access control (MAC) layers. They have highlighted some characteristics with experimental results and/or have attempted to reproduce them using theoretical models. In this paper, we use the first way to be…
▽ More
Many studies have tried to evaluate wireless networks and especially the IEEE 802.15.4 standard. Hence, several papers have aimed to describe the functionalities of the physical (PHY) and medium access control (MAC) layers. They have highlighted some characteristics with experimental results and/or have attempted to reproduce them using theoretical models. In this paper, we use the first way to better understand IEEE 802.15.4 standard. Indeed, we provide a comprehensive model, able more faithfully to mimic the functionalities of this standard at the PHY and MAC layers. We propose a combination of two relevant models for the two layers. The PHY layer behavior is reproduced by a mathematical framework, which is based on radio and channel models, in order to quantify link reliability. On the other hand, the MAC layer is mimed by an enhanced Markov chain. The results show the pertinence of our approach compared to the model based on a Markov chain for IEEE 802.15.4 MAC layer. This contribution allows us fully and more precisely to estimate the network performance with different network sizes, as well as different metrics such as node reliability and delay. Our contribution enables us to catch possible failures at both layers.
△ Less
Submitted 15 May, 2012;
originally announced May 2012.
-
Information Centric Networking based Handover Support for QoS Maintenance in Cooperative Heterogeneous Wireless Networks
Authors:
Muhammad Shoaib Saleem,
Eric Renault,
Djamal Zeghlache
Abstract:
Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this report, we propose an architecture of mobile node for NetInf. We call it NetInf Mobile Node. It is an extension of the basic node architecture proposed for NetInf. It is compatible to NetInf and TCP/IP base…
▽ More
Network of Information (NetInf) is a term coined for networks which unlike contemporary network are not node centric. As the name indicates, information supersedes nodes in the network. In this report, we propose an architecture of mobile node for NetInf. We call it NetInf Mobile Node. It is an extension of the basic node architecture proposed for NetInf. It is compatible to NetInf and TCP/IP based networks. The Virtual Node Layer modules in the architecture provide support for managing mobility, power consumption of the node as well data relaying/storing services. In- ner/Outer Locator Construction Routers (I/O LCTR) are two functions introduced in NetInf mobile nodes to operate between NetInf and non- NetInf sites. The basic purpose of NetInf mobile node is to maintain the QoS during mobility events. The handoff/handover are critical situations during mobility where chances of QoS degradation of an ongoing session are high. This report presents one such scenario in which QoS of an appli- cation is maintained during a handoff situations in heterogeneous wireless network environment through our proposed algorithm.
△ Less
Submitted 16 August, 2011;
originally announced August 2011.
-
Tensor-Based Link Prediction in Intermittently Connected Wireless Networks
Authors:
Mohamed-Haykel Zayani,
Vincent Gauthier,
Ines Slama,
Djamal Zeghlache
Abstract:
Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in the network protocols design, e.g. to identify th…
▽ More
Through several studies, it has been highlighted that mobility patterns in mobile networks are driven by human behaviors. This effect has been particularly observed in intermittently connected networks like DTN (Delay Tolerant Networks). Given that common social intentions generate similar human behavior, it is relevant to exploit this knowledge in the network protocols design, e.g. to identify the closeness degree between two nodes. In this paper, we propose a temporal link prediction technique for DTN which quantifies the behavior similarity between each pair of nodes and makes use of it to predict future links. Our prediction method keeps track of the spatio-temporal aspects of nodes behaviors organized as a third-order tensor that aims to records the evolution of the network topology. After collapsing the tensor information, we compute the degree of similarity for each pair of nodes using the Katz measure. This metric gives us an indication on the link occurrence between two nodes relying on their closeness. We show the efficiency of this method by applying it on three mobility traces: two real traces and one synthetic trace. Through several simulations, we demonstrate the effectiveness of the technique regarding another approach based on a similarity metric used in DTN. The validity of this method is proven when the computation of score is made in a distributed way (i.e. with local information). We attest that the tensor-based technique is effective for temporal link prediction applied to the intermittently connected networks. Furthermore, we think that this technique can go beyond the realm of DTN and we believe this can be further applied on every case of figure in which there is a need to derive the underlying social structure of a network of mobile users.
△ Less
Submitted 12 August, 2011;
originally announced August 2011.
-
NetInf Mobile Node Architecture and Mobility Management based on LISP Mobile Node
Authors:
Muhammad Shoaib Saleem,
Éric Renault,
Djamal Zeghlache
Abstract:
In this paper, we propose an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic NetInf node architecture with features introduced in the LISP MN architecture. We also introduce a virtual node layer for mobility management in the Network of Information. Therefore, by adopting this architecture no major changes in the contemporary network…
▽ More
In this paper, we propose an architecture for Network of Information mobile node (NetInf MN). It bears characteristics and features of basic NetInf node architecture with features introduced in the LISP MN architecture. We also introduce a virtual node layer for mobility management in the Network of Information. Therefore, by adopting this architecture no major changes in the contemporary network topologies is required. Thus, making our approach more practical.
△ Less
Submitted 16 August, 2011; v1 submitted 30 September, 2010;
originally announced September 2010.