-
Personalized and Context-aware Route Planning for Edge-assisted Vehicles
Authors:
Dinesh Cyril Selvaraj,
Falko Dressler,
Carla Fabiana Chiasserini
Abstract:
Conventional route planning services typically offer the same routes to all drivers, focusing primarily on a few standardized factors such as travel distance or time, overlooking individual driver preferences. With the inception of autonomous vehicles expected in the coming years, where vehicles will rely on routes decided by such planners, there arises a need to incorporate the specific preferenc…
▽ More
Conventional route planning services typically offer the same routes to all drivers, focusing primarily on a few standardized factors such as travel distance or time, overlooking individual driver preferences. With the inception of autonomous vehicles expected in the coming years, where vehicles will rely on routes decided by such planners, there arises a need to incorporate the specific preferences of each driver, ensuring personalized navigation experiences. In this work, we propose a novel approach based on graph neural networks (GNNs) and deep reinforcement learning (DRL), aimed at customizing routes to suit individual preferences. By analyzing the historical trajectories of individual drivers, we classify their driving behavior and associate it with relevant road attributes as indicators of driver preferences. The GNN is capable of representing the road network as graph-structured data effectively, while DRL is capable of making decisions utilizing reward mechanisms to optimize route selection with factors such as travel costs, congestion level, and driver satisfaction. We evaluate our proposed GNN-based DRL framework using a real-world road network and demonstrate its ability to accommodate driver preferences, offering a range of route options tailored to individual drivers. The results indicate that our framework can select routes that accommodate driver's preferences with up to a 17% improvement compared to a generic route planner, and reduce the travel time by 33% (afternoon) and 46% (evening) relatively to the shortest distance-based approach.
△ Less
Submitted 25 July, 2024;
originally announced July 2024.
-
Adaptive Autopilot: Constrained DRL for Diverse Driving Behaviors
Authors:
Dinesh Cyril Selvaraj,
Christian Vitale,
Tania Panayiotou,
Panayiotis Kolios,
Carla Fabiana Chiasserini,
Georgios Ellinas
Abstract:
In pursuit of autonomous vehicles, achieving human-like driving behavior is vital. This study introduces adaptive autopilot (AA), a unique framework utilizing constrained-deep reinforcement learning (C-DRL). AA aims to safely emulate human driving to reduce the necessity for driver intervention. Focusing on the car-following scenario, the process involves (i) extracting data from the highD natural…
▽ More
In pursuit of autonomous vehicles, achieving human-like driving behavior is vital. This study introduces adaptive autopilot (AA), a unique framework utilizing constrained-deep reinforcement learning (C-DRL). AA aims to safely emulate human driving to reduce the necessity for driver intervention. Focusing on the car-following scenario, the process involves (i) extracting data from the highD natural driving study and categorizing it into three driving styles using a rule-based classifier; (ii) employing deep neural network (DNN) regressors to predict human-like acceleration across styles; and (iii) using C-DRL, specifically the soft actor-critic Lagrangian technique, to learn human-like safe driving policies. Results indicate effectiveness in each step, with the rule-based classifier distinguishing driving styles, the regressor model accurately predicting acceleration, outperforming traditional car-following models, and C-DRL agents learning optimal policies for humanlike driving across styles.
△ Less
Submitted 2 July, 2024;
originally announced July 2024.
-
OREO: O-RAN intElligence Orchestration of xApp-based network services
Authors:
Federico Mungari,
Corrado Puligheddu,
Andres Garcia-Saavedra,
Carla Fabiana Chiasserini
Abstract:
The Open Radio Access Network (O-RAN) architecture aims to support a plethora of network services, such as beam management and network slicing, through the use of third-party applications called xApps. To efficiently provide network services at the radio interface, it is thus essential that the deployment of the xApps is carefully orchestrated. In this paper, we introduce OREO, an O-RAN xApp orche…
▽ More
The Open Radio Access Network (O-RAN) architecture aims to support a plethora of network services, such as beam management and network slicing, through the use of third-party applications called xApps. To efficiently provide network services at the radio interface, it is thus essential that the deployment of the xApps is carefully orchestrated. In this paper, we introduce OREO, an O-RAN xApp orchestrator, designed to maximize the offered services. OREO's key idea is that services can share xApps whenever they correspond to semantically equivalent functions, and the xApp output is of sufficient quality to fulfill the service requirements. By leveraging a multi-layer graph model that captures all the system components, from services to xApps, OREO implements an algorithmic solution that selects the best service configuration, maximizes the number of shared xApps, and efficiently and dynamically allocates resources to them. Numerical results as well as experimental tests performed using our proof-of-concept implementation, demonstrate that OREO closely matches the optimum, obtained by solving an NP-hard problem. Further, it outperforms the state of the art, deploying up to 35% more services with an average of 30% fewer xApps and a similar reduction in the resource consumption.
△ Less
Submitted 30 May, 2024; v1 submitted 28 May, 2024;
originally announced May 2024.
-
Combining Relevance and Magnitude for Resource-Aware DNN Pruning
Authors:
Carla Fabiana Chiasserini,
Francesco Malandrino,
Nuria Molner,
Zhiqiang Zhao
Abstract:
Pruning neural networks, i.e., removing some of their parameters whilst retaining their accuracy, is one of the main ways to reduce the latency of a machine learning pipeline, especially in resource- and/or bandwidth-constrained scenarios. In this context, the pruning technique, i.e., how to choose the parameters to remove, is critical to the system performance. In this paper, we propose a novel p…
▽ More
Pruning neural networks, i.e., removing some of their parameters whilst retaining their accuracy, is one of the main ways to reduce the latency of a machine learning pipeline, especially in resource- and/or bandwidth-constrained scenarios. In this context, the pruning technique, i.e., how to choose the parameters to remove, is critical to the system performance. In this paper, we propose a novel pruning approach, called FlexRel and predicated upon combining training-time and inference-time information, namely, parameter magnitude and relevance, in order to improve the resulting accuracy whilst saving both computational resources and bandwidth. Our performance evaluation shows that FlexRel is able to achieve higher pruning factors, saving over 35% bandwidth for typical accuracy targets.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
Edge-Assisted ML-Aided Uncertainty-Aware Vehicle Collision Avoidance at Urban Intersections
Authors:
Dinesh Cyril Selvaraj,
Christian Vitale,
Tania Panayiotou,
Panayiotis Kolios,
Carla Fabiana Chiasserini,
Georgios Ellinas
Abstract:
Intersection crossing represents one of the most dangerous sections of the road infrastructure and Connected Vehicles (CVs) can serve as a revolutionary solution to the problem. In this work, we present a novel framework that detects preemptively collisions at urban crossroads, exploiting the Multi-access Edge Computing (MEC) platform of 5G networks. At the MEC, an Intersection Manager (IM) collec…
▽ More
Intersection crossing represents one of the most dangerous sections of the road infrastructure and Connected Vehicles (CVs) can serve as a revolutionary solution to the problem. In this work, we present a novel framework that detects preemptively collisions at urban crossroads, exploiting the Multi-access Edge Computing (MEC) platform of 5G networks. At the MEC, an Intersection Manager (IM) collects information from both vehicles and the road infrastructure to create a holistic view of the area of interest. Based on the historical data collected, the IM leverages the capabilities of an encoder-decoder recurrent neural network to predict, with high accuracy, the future vehicles' trajectories. As, however, accuracy is not a sufficient measure of how much we can trust a model, trajectory predictions are additionally associated with a measure of uncertainty towards confident collision forecasting and avoidance. Hence, contrary to any other approach in the state of the art, an uncertainty-aware collision prediction framework is developed that is shown to detect well in advance (and with high reliability) if two vehicles are on a collision course. Subsequently, collision detection triggers a number of alarms that signal the colliding vehicles to brake. Under real-world settings, thanks to the preemptive capabilities of the proposed approach, all the simulated imminent dangers are averted.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Resource-aware Deployment of Dynamic DNNs over Multi-tiered Interconnected Systems
Authors:
Chetna Singhal,
Yashuo Wu,
Francesco Malandrino,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
The increasing pervasiveness of intelligent mobile applications requires to exploit the full range of resources offered by the mobile-edge-cloud network for the execution of inference tasks. However, due to the heterogeneity of such multi-tiered networks, it is essential to make the applications' demand amenable to the available resources while minimizing energy consumption. Modern dynamic deep ne…
▽ More
The increasing pervasiveness of intelligent mobile applications requires to exploit the full range of resources offered by the mobile-edge-cloud network for the execution of inference tasks. However, due to the heterogeneity of such multi-tiered networks, it is essential to make the applications' demand amenable to the available resources while minimizing energy consumption. Modern dynamic deep neural networks (DNN) achieve this goal by designing multi-branched architectures where early exits enable sample-based adaptation of the model depth. In this paper, we tackle the problem of allocating sections of DNNs with early exits to the nodes of the mobile-edge-cloud system. By envisioning a 3-stage graph-modeling approach, we represent the possible options for splitting the DNN and deploying the DNN blocks on the multi-tiered network, embedding both the system constraints and the application requirements in a convenient and efficient way. Our framework -- named Feasible Inference Graph (FIN) -- can identify the solution that minimizes the overall inference energy consumption while enabling distributed inference over the multi-tiered network with the target quality and latency. Our results, obtained for DNNs with different levels of complexity, show that FIN matches the optimum and yields over 65% energy savings relative to a state-of-the-art technique for cost minimization.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
ADROIT6G DAI-driven Open and Programmable Architecture for 6G Networks
Authors:
Christophoros Christophorou,
Iacovos Ioannou,
Vasos Vassiliou,
Loizos Christofi,
John S Vardakas,
Erin E Seder,
Carla Fabiana Chiasserini,
Marius Iordache,
Chaouki Ben Issaid,
Ioannis Markopoulos,
Giulio Franzese,
Tanel Järvet,
Christos Verikoukis
Abstract:
In the upcoming 6G era, mobile networks must deal with more challenging applications (e.g., holographic telepresence and immersive communication) and meet far more stringent application requirements stemming along the edge-cloud continuum. These new applications will create an elevated level of expectations on performance, reliability, ubiquity, trustworthiness, security, openness, and sustainabil…
▽ More
In the upcoming 6G era, mobile networks must deal with more challenging applications (e.g., holographic telepresence and immersive communication) and meet far more stringent application requirements stemming along the edge-cloud continuum. These new applications will create an elevated level of expectations on performance, reliability, ubiquity, trustworthiness, security, openness, and sustainability, pushing the boundaries of innovation and driving transformational change across the architecture of future mobile networks. Towards this end, ADROIT6G proposes a set of disruptive innovations with a clear vision on setting a 6G network architecture that can be tailored to the requirements of innovative applications and match the ambitious KPIs set for 6G networks. More specifically, the key transformations that ADROIT6G considers essential to 6G network evolution are: i) AI/ML-powered optimisations across the network, exploring solutions in the "Distributed Artificial Intelligence (DAI)" domain for high performance and automation; ii) Transforming to fully cloud-native network software, which can be implemented across various edge-cloud platforms, with security built integrally into the network user plan; and iii) Software driven, zero-touch operations and ultimately automation of every aspect of the network and the services it delivers.
△ Less
Submitted 8 March, 2024;
originally announced March 2024.
-
Eavesdropping with Intelligent Reflective Surfaces: Near-Optimal Configuration Cycling
Authors:
Francesco Malandrino,
Alessandro Nordio,
Carla Fabiana Chiasserini
Abstract:
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communication security and privacy. In this work, we focus on the latter aspect and introduce a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users that are facilitated by the presence of IRSs. Specifical…
▽ More
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communication security and privacy. In this work, we focus on the latter aspect and introduce a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users that are facilitated by the presence of IRSs. Specifically, we envision a transmission scheme that cycles across a number of IRS-to-user assignments, and we select them in a near-optimal fashion, thus guaranteeing both a high data rate and a good secrecy rate. Unlike most of the existing works addressing passive eavesdropping, the strategy we envision has low complexity and is suitable for scenarios where nodes are equipped with a limited number of antennas. Through our performance evaluation, we highlight the trade-off between the legitimate users' data rate and secrecy rate, and how the system parameters affect such a trade-off.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Dependable Distributed Training of Compressed Machine Learning Models
Authors:
Francesco Malandrino,
Giuseppe Di Giacomo,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
The existing work on the distributed training of machine learning (ML) models has consistently overlooked the distribution of the achieved learning quality, focusing instead on its average value. This leads to a poor dependability}of the resulting ML models, whose performance may be much worse than expected. We fill this gap by proposing DepL, a framework for dependable learning orchestration, abl…
▽ More
The existing work on the distributed training of machine learning (ML) models has consistently overlooked the distribution of the achieved learning quality, focusing instead on its average value. This leads to a poor dependability}of the resulting ML models, whose performance may be much worse than expected. We fill this gap by proposing DepL, a framework for dependable learning orchestration, able to make high-quality, efficient decisions on (i) the data to leverage for learning, (ii) the models to use and when to switch among them, and (iii) the clusters of nodes, and the resources thereof, to exploit. For concreteness, we consider as possible available models a full DNN and its compressed versions. Unlike previous studies, DepL guarantees that a target learning quality is reached with a target probability, while keeping the training cost at a minimum. We prove that DepL has constant competitive ratio and polynomial complexity, and show that it outperforms the state-of-the-art by over 27% and closely matches the optimum.
△ Less
Submitted 22 February, 2024;
originally announced February 2024.
-
Human-Centric Decision-Making in Cell-Less 6G Networks
Authors:
Emma Chiaramello,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Alessandro Nordio,
Marta Parazzini,
Alvaro Valcarce
Abstract:
In next-generation networks, cells will be replaced by a collection of points-of-access (PoAs), with overlapping coverage areas and/or different technologies. Along with a promise for greater performance and flexibility, this creates further pressure on network management algorithms, which must make joint decisions on (i) PoA-to-user association and (ii) PoA management. We solve this challenging p…
▽ More
In next-generation networks, cells will be replaced by a collection of points-of-access (PoAs), with overlapping coverage areas and/or different technologies. Along with a promise for greater performance and flexibility, this creates further pressure on network management algorithms, which must make joint decisions on (i) PoA-to-user association and (ii) PoA management. We solve this challenging problem through an efficient and effective solution concept called Cluster-then-Match (CtM). Importantly, CtM makes human-centric decisions, where pure network performance is balanced against metrics like energy consumption and electromagnetic field exposure, which concern all humans in the network area -- including those who are not network users. Through our performance evaluation, which leverages detailed models for EMF exposure estimation and standard-specified signal propagation models, we show that CtM outperforms state-of-the-art network management schemes, including those utilizing machine learning, reducing energy consumption by over 80%.
△ Less
Submitted 30 July, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
Distributed Asynchronous Service Provisioning in the Edge-Cloud Multi-tier Network
Authors:
Itamar Cohen,
Paolo Giaccone,
Carla Fabiana Chiasserini
Abstract:
In an edge-cloud multi-tier network, datacenters provide services to mobile users, with each service having specific latency constraints and computational requirements. Deploying such a variety of services while matching their requirements with the available computing resources is challenging. In addition, time-critical services may have to be migrated as the users move, to keep fulfilling their l…
▽ More
In an edge-cloud multi-tier network, datacenters provide services to mobile users, with each service having specific latency constraints and computational requirements. Deploying such a variety of services while matching their requirements with the available computing resources is challenging. In addition, time-critical services may have to be migrated as the users move, to keep fulfilling their latency constraints. Unlike previous work relying on an orchestrator with an always-updated global view of the available resources and the users' locations, this work envisions a distributed solution to the above problems. In particular, we propose a distributed asynchronous framework for service deployment in the edge-cloud that increases the system resilience by avoiding a single point of failure, as in the case of a central orchestrator. Our solution ensures cost-efficient feasible placement of services, while using negligible bandwidth. Our results, obtained through trace-driven, large-scale simulations, show that the proposed solution provides performance very close to those obtained by state-of-the-art centralized solutions, and at the cost of a small communication overhead.
△ Less
Submitted 18 December, 2023;
originally announced December 2023.
-
Robust Localization and Tracking of UAVs in OTFS-based Networks
Authors:
Alessandro Nordio,
Carla Fabiana Chiasserini,
Emanuele Viterbo
Abstract:
We consider the problem of accurately localizing N unmanned aerial vehicles (UAV) in 3D space where the UAVs are part of a swarm and communicate with each other through orthogonal time-frequency space (OTFS) modulated signals. Each receiving UAV estimates the multipath wireless channel on each link formed by the line-of-sight (LoS) transmission and by the single reflections from the remaining N-2…
▽ More
We consider the problem of accurately localizing N unmanned aerial vehicles (UAV) in 3D space where the UAVs are part of a swarm and communicate with each other through orthogonal time-frequency space (OTFS) modulated signals. Each receiving UAV estimates the multipath wireless channel on each link formed by the line-of-sight (LoS) transmission and by the single reflections from the remaining N-2 UAVs. The estimated power delay profiles are communicated to an edge server, which is in charge of computing the exact location and speed of the UAVs. To obtain the UAVs locations and velocities, we propose an iterative algorithm, named Turbo Iterative Positioning (TIP), which, using a belief-propagation approach, effectively exploits the time difference of arrival (TDoA) measurements between the LoS and the non-LoS paths. Enabling a full cold start (no prior knowledge), our solution first maps each TDoA's profile element to a specific ID of the reflecting UAV's. The Doppler shifts measured by the OTFS receivers associated with each path are also used to estimate the UAV's velocities. The localization of the N UAVs is then derived via gradient descent optimization, with the aid of turbo-like iterations that can progressively correct some of the residual errors in the initial ID mapping operation. Our numerical results, obtained also using real-world traces, show how the multipath links are beneficial to achieving very accurate localization and speed of all UAVs, even with a limited delay-Doppler resolution. Robustness of our scheme is proven by its performance approaching the Cramer-Rao bound.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Asynchronous Distributed Protocol for Service Provisioning in the Edge-Cloud Continuum
Authors:
Itamar Cohen,
Paolo Giaccone,
Carla Fabiana Chiasserini
Abstract:
In the edge-cloud continuum, datacenters provide microservices (MSs) to mobile users, with each MS having specific latency constraints and computational requirements. Deploying such a variety of MSs matching their requirements with the available computing resources is challenging. In addition, time-critical MSs may have to be migrated as the users move, to keep meeting their latency constraints. U…
▽ More
In the edge-cloud continuum, datacenters provide microservices (MSs) to mobile users, with each MS having specific latency constraints and computational requirements. Deploying such a variety of MSs matching their requirements with the available computing resources is challenging. In addition, time-critical MSs may have to be migrated as the users move, to keep meeting their latency constraints. Unlike previous work relying on a central orchestrator with an always-updated global view of the available resources and of the users' locations, this work envisions a distributed solution to the above issues. In particular, we propose a distributed asynchronous protocol for MS deployment in the cloud-edge continuum that (i) dramatically reduces the system overhead compared to a centralized approach, and (ii) increases the system stability by avoiding having a single point of failure as in the case of a central orchestrator. Our solution ensures cost-efficient feasible placement of MSs, while using negligible bandwidth.
△ Less
Submitted 29 April, 2023;
originally announced May 2023.
-
5G-Advanced Towards 6G: Past, Present, and Future
Authors:
Wanshi Chen,
Xingqin Lin,
Juho Lee,
Antti Toskala,
Shu Sun,
Carla Fabiana Chiasserini,
Lingjia Liu
Abstract:
Since the start of 5G work in 3GPP in early 2016, tremendous progress has been made in both standardization and commercial deployments. 3GPP is now entering the second phase of 5G standardization, known as 5G-Advanced, built on the 5G baseline in 3GPP Releases 15, 16, and 17. 3GPP Release 18, the start of 5G-Advanced, includes a diverse set of features that cover both device and network evolutions…
▽ More
Since the start of 5G work in 3GPP in early 2016, tremendous progress has been made in both standardization and commercial deployments. 3GPP is now entering the second phase of 5G standardization, known as 5G-Advanced, built on the 5G baseline in 3GPP Releases 15, 16, and 17. 3GPP Release 18, the start of 5G-Advanced, includes a diverse set of features that cover both device and network evolutions, providing balanced mobile broadband evolution and further vertical domain expansion and accommodating both immediate and long-term commercial needs. 5G-Advanced will significantly expand 5G capabilities, address many new use cases, transform connectivity experiences, and serve as an essential step in developing mobile communications towards 6G. This paper provides a comprehensive overview of the 3GPP 5G-Advanced development, introducing the prominent state-of-the-art technologies investigated in 3GPP and identifying key evolution directions for future research and standardization.
△ Less
Submitted 13 March, 2023;
originally announced March 2023.
-
SEM-O-RAN: Semantic and Flexible O-RAN Slicing for NextG Edge-Assisted Mobile Systems
Authors:
Corrado Puligheddu,
Jonathan Ashdown,
Carla Fabiana Chiasserini,
Francesco Restuccia
Abstract:
5G and beyond cellular networks (NextG) will support the continuous execution of resource-expensive edge-assisted deep learning (DL) tasks. To this end, Radio Access Network (RAN) resources will need to be carefully "sliced" to satisfy heterogeneous application requirements while minimizing RAN usage. Existing slicing frameworks treat each DL task as equal and inflexibly define the resources to as…
▽ More
5G and beyond cellular networks (NextG) will support the continuous execution of resource-expensive edge-assisted deep learning (DL) tasks. To this end, Radio Access Network (RAN) resources will need to be carefully "sliced" to satisfy heterogeneous application requirements while minimizing RAN usage. Existing slicing frameworks treat each DL task as equal and inflexibly define the resources to assign to each task, which leads to sub-optimal performance. In this paper, we propose SEM-O-RAN, the first semantic and flexible slicing framework for NextG Open RANs. Our key intuition is that different DL classifiers can tolerate different levels of image compression, due to the semantic nature of the target classes. Therefore, compression can be semantically applied so that the networking load can be minimized. Moreover, flexibility allows SEM-O-RAN to consider multiple edge allocations leading to the same task-related performance, which significantly improves system-wide performance as more tasks can be allocated. First, we mathematically formulate the Semantic Flexible Edge Slicing Problem (SF-ESP), demonstrate that it is NP-hard, and provide an approximation algorithm to solve it efficiently. Then, we evaluate the performance of SEM-O-RAN through extensive numerical analysis with state-of-the-art multi-object detection (YOLOX) and image segmentation (BiSeNet V2), as well as real-world experiments on the Colosseum testbed. Our results show that SEM-O-RAN improves the number of allocated tasks by up to 169% with respect to the state of the art.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
Matching DNN Compression and Cooperative Training with Resources and Data Availability
Authors:
Francesco Malandrino,
Giuseppe Di Giacomo,
Armin Karamzade,
Marco Levorato,
Carla Fabiana Chiasserini
Abstract:
To make machine learning (ML) sustainable and apt to run on the diverse devices where relevant data is, it is essential to compress ML models as needed, while still meeting the required learning quality and time performance. However, how much and when an ML model should be compressed, and {\em where} its training should be executed, are hard decisions to make, as they depend on the model itself, t…
▽ More
To make machine learning (ML) sustainable and apt to run on the diverse devices where relevant data is, it is essential to compress ML models as needed, while still meeting the required learning quality and time performance. However, how much and when an ML model should be compressed, and {\em where} its training should be executed, are hard decisions to make, as they depend on the model itself, the resources of the available nodes, and the data such nodes own. Existing studies focus on each of those aspects individually, however, they do not account for how such decisions can be made jointly and adapted to one another. In this work, we model the network system focusing on the training of DNNs, formalize the above multi-dimensional problem, and, given its NP-hardness, formulate an approximate dynamic programming problem that we solve through the PACT algorithmic framework. Importantly, PACT leverages a time-expanded graph representing the learning process, and a data-driven and theoretical approach for the prediction of the loss evolution to be expected as a consequence of training decisions. We prove that PACT's solutions can get as close to the optimum as desired, at the cost of an increased time complexity, and that, in any case, such complexity is polynomial. Numerical results also show that, even under the most disadvantageous settings, PACT outperforms state-of-the-art alternatives and closely matches the optimal energy cost.
△ Less
Submitted 2 December, 2022;
originally announced December 2022.
-
Unexpectedly Useful: Convergence Bounds And Real-World Distributed Learning
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Convergence bounds are one of the main tools to obtain information on the performance of a distributed machine learning task, before running the task itself. In this work, we perform a set of experiments to assess to which extent, and in which way, such bounds can predict and improve the performance of real-world distributed (namely, federated) learning tasks. We find that, as can be expected give…
▽ More
Convergence bounds are one of the main tools to obtain information on the performance of a distributed machine learning task, before running the task itself. In this work, we perform a set of experiments to assess to which extent, and in which way, such bounds can predict and improve the performance of real-world distributed (namely, federated) learning tasks. We find that, as can be expected given the way they are obtained, bounds are quite loose and their relative magnitude reflects the training rather than the testing loss. More unexpectedly, we find that some of the quantities appearing in the bounds turn out to be very useful to identify the clients that are most likely to contribute to the learning process, without requiring the disclosure of any information about the quality or size of their datasets. This suggests that further research is warranted on the ways -- often counter-intuitive -- in which convergence bounds can be exploited to improve the performance of real-world distributed learning tasks.
△ Less
Submitted 5 December, 2022;
originally announced December 2022.
-
Virtual Service Embedding with Time-Varying Load and Provable Guarantees
Authors:
Gil Einziger,
Gabriel Scalosub,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Deploying services efficiently while satisfying their quality requirements is a major challenge in network slicing. Effective solutions place instances of the services' virtual network functions (VNFs) at different locations of the cellular infrastructure and manage such instances by scaling them as needed. In this work, we address the above problem and the very relevant aspect of sub-slice reuse…
▽ More
Deploying services efficiently while satisfying their quality requirements is a major challenge in network slicing. Effective solutions place instances of the services' virtual network functions (VNFs) at different locations of the cellular infrastructure and manage such instances by scaling them as needed. In this work, we address the above problem and the very relevant aspect of sub-slice reuse among different services. Further, unlike prior art, we account for the services' finite lifetime and time-varying traffic load. We identify two major sources of inefficiency in service management: (i) the overspending of computing resources due to traffic of multiple services with different latency requirements being processed by the same virtual machine (VM), and (ii) the poor packing of traffic processing requests in the same VM, leading to opening more VMs than necessary. To cope with the above issues, we devise an algorithm, called REShare, that can dynamically adapt to the system's operational conditions and find an optimal trade-off between the aforementioned opposite requirements. We prove that REShare has low algorithmic complexity and is asymptotic 2-competitive under a non-decreasing load. Numerical results, leveraging real-world scenarios, show that our solution outperforms alternatives, swiftly adapting to time-varying conditions and reducing service cost by over 25%.
△ Less
Submitted 18 November, 2022;
originally announced November 2022.
-
Performance and EMF Exposure Trade-offs in Human-centric Cell-free Networks
Authors:
Francesco Malandrino,
Emma Chiaramello,
Marta Parazzini,
Carla Fabiana Chiasserini
Abstract:
In cell-free wireless networks, multiple connectivity options and technologies are available to serve each user. Traditionally, such options are ranked and selected solely based on the network performance they yield; however, additional information such as electromagnetic field (EMF) exposure could be considered. In this work, we explore the trade-offs between network performance and EMF exposure…
▽ More
In cell-free wireless networks, multiple connectivity options and technologies are available to serve each user. Traditionally, such options are ranked and selected solely based on the network performance they yield; however, additional information such as electromagnetic field (EMF) exposure could be considered. In this work, we explore the trade-offs between network performance and EMF exposure in a typical indoor scenario, finding that it is possible to significantly reduce the latter with a minor impact on the former. We further find that surrogate models represent an efficient and effective tool to model the network behavior.
△ Less
Submitted 13 July, 2022;
originally announced July 2022.
-
Efficient Distributed DNNs in the Mobile-edge-cloud Continuum
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Giuseppe Di Giacomo
Abstract:
In the mobile-edge-cloud continuum, a plethora of heterogeneous data sources and computation-capable nodes are available. Such nodes can cooperate to perform a distributed learning task, aided by a learning controller (often located at the network edge). The controller is required to make decisions concerning (i) data selection, i.e., which data sources to use; (ii) model selection, i.e., which ma…
▽ More
In the mobile-edge-cloud continuum, a plethora of heterogeneous data sources and computation-capable nodes are available. Such nodes can cooperate to perform a distributed learning task, aided by a learning controller (often located at the network edge). The controller is required to make decisions concerning (i) data selection, i.e., which data sources to use; (ii) model selection, i.e., which machine learning model to adopt, and (iii) matching between the layers of the model and the available physical nodes. All these decisions influence each other, to a significant extent and often in counter-intuitive ways. In this paper, we formulate a problem addressing all of the above aspects and present a solution concept called RightTrain, aiming at making the aforementioned decisions in a joint manner, minimizing energy consumption subject to learning quality and latency constraints. RightTrain leverages an expanded-graph representation of the system and a delay-aware Steiner tree to obtain a provably near-optimal solution while keeping the time complexity low. Specifically, it runs in polynomial time and its decisions exhibit a competitive ratio of $2(1+ε)$, outperforming state-of-the-art solutions by over 50%. Our approach is also validated through a real-world implementation.
△ Less
Submitted 14 November, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Dynamic Service Provisioning in the Edge-cloud Continuum with Provable Guarantees
Authors:
Itamar Cohen,
Carla Fabiana Chiasserini,
Paolo Giaccone,
Gabriel Scalosub
Abstract:
We consider a hierarchical edge-cloud architecture in which services are provided to mobile users as chains of virtual network functions. Each service has specific computation requirements and target delay performance, which require placing the corresponding chain properly and allocating a suitable amount of computing resources. Furthermore, chain migration may be necessary to meet the services' t…
▽ More
We consider a hierarchical edge-cloud architecture in which services are provided to mobile users as chains of virtual network functions. Each service has specific computation requirements and target delay performance, which require placing the corresponding chain properly and allocating a suitable amount of computing resources. Furthermore, chain migration may be necessary to meet the services' target delay, or convenient to keep the service provisioning cost low. We tackle such issues by formalizing the problem of optimal chain placement and resource allocation in the edge-cloud continuum, taking into account migration, bandwidth, and computation costs. Specifically, we first envision an algorithm that, leveraging resource augmentation, addresses the above problem and provides an upper bound to the amount of resources required to find a feasible solution. We use this algorithm as a building block to devise an efficient approach targeting the minimum-cost solution, while minimizing the required resource augmentation. Our results, obtained through trace-driven, large-scale simulations, show that our solution can provide a feasible solution by using half the amount of resources required by state-of-the-art alternatives.
△ Less
Submitted 17 February, 2022;
originally announced February 2022.
-
Flexible Parallel Learning in Edge Scenarios: Communication, Computational and Energy Cost
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Traditionally, distributed machine learning takes the guise of (i) different nodes training the same model (as in federated learning), or (ii) one model being split among multiple nodes (as in distributed stochastic gradient descent). In this work, we highlight how fog- and IoT-based scenarios often require combining both approaches, and we present a framework for flexible parallel learning (FPL),…
▽ More
Traditionally, distributed machine learning takes the guise of (i) different nodes training the same model (as in federated learning), or (ii) one model being split among multiple nodes (as in distributed stochastic gradient descent). In this work, we highlight how fog- and IoT-based scenarios often require combining both approaches, and we present a framework for flexible parallel learning (FPL), achieving both data and model parallelism. Further, we investigate how different ways of distributing and parallelizing learning tasks across the participating nodes result in different computation, communication, and energy costs. Our experiments, carried out using state-of-the-art deep-network architectures and large-scale datasets, confirm that FPL allows for an excellent trade-off among computational (hence energy) cost, communication overhead, and learning performance.
△ Less
Submitted 18 January, 2022;
originally announced January 2022.
-
Characterizing the Computational and Memory Requirements of Virtual RANs
Authors:
Somreeta Pramanik,
Adlen Ksentini,
Carla Fabiana Chiasserini
Abstract:
The virtualization of radio access networks (RANs) is emerging as a key component of future wireless systems, as it brings agility to the RAN architecture and offers degrees of design freedom. In this paper, we investigate and characterize the computational and memory requirements of virtual RANs. To this end, we build a virtual RAN test-bed leveraging the srsRAN open-source mobile communication p…
▽ More
The virtualization of radio access networks (RANs) is emerging as a key component of future wireless systems, as it brings agility to the RAN architecture and offers degrees of design freedom. In this paper, we investigate and characterize the computational and memory requirements of virtual RANs. To this end, we build a virtual RAN test-bed leveraging the srsRAN open-source mobile communication platform and general-purpose processor-based servers. Through extensive experiments, we profile the consumption of computing and memory resources, and we assess the system performance. Further, we build regression models to predict the system behavior as the number of connected users increases, under diverse radio transmission settings. In so doing, we develop a methodology and prediction models that can help designing and optimizing virtual RANs.
△ Less
Submitted 3 January, 2022;
originally announced January 2022.
-
A Belief Propagation Solution for Beam Coordination in MmWave Vehicular Networks
Authors:
Zana Limani Fazliu,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Alessandro Nordio
Abstract:
Millimeter-wave communication is widely seen as a promising option to increase the capacity of vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Due to harsh propagation conditions, mmWave systems resort to narrow beams to serve their users, and such beams need to be configured according to traffic demand and its spatial dist…
▽ More
Millimeter-wave communication is widely seen as a promising option to increase the capacity of vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Due to harsh propagation conditions, mmWave systems resort to narrow beams to serve their users, and such beams need to be configured according to traffic demand and its spatial distribution, as well as interference. In this work, we address the beam management problem, considering an urban vehicular network composed of gNBs. We first build an accurate, yet tractable, system model and formulate an optimization problem aiming at maximizing the total network data rate while accounting for the stochastic nature of the network scenario. Then we develop a graph-based model capturing the main system characteristics and use it to develop a belief propagation algorithmic framework, called CRAB, that has low complexity and, hence, can effectively cope with large-scale scenarios. We assess the performance of our approach under real-world settings and show that, in comparison to state-of-the-art alternatives, CRAB provides on average a 50% improvement in the amount of data transferred by the single gNBs and up to 30% better user coverage.
△ Less
Submitted 23 June, 2022; v1 submitted 17 December, 2021;
originally announced December 2021.
-
A Context-aware Radio Resource Management in Heterogeneous Virtual RANs
Authors:
Sharda Tripathi,
Corrado Puligheddu,
Carla Fabiana Chiasserini,
Federico Mungari
Abstract:
New-generation wireless networks are designed to support a wide range of services with diverse key performance indicators (KPIs) requirements. A fundamental component of such networks, and a pivotal factor to the fulfillment of the target KPIs, is the virtual radio access network (vRAN), which allows high flexibility on the control of the radio link. However, to fully exploit the potentiality of v…
▽ More
New-generation wireless networks are designed to support a wide range of services with diverse key performance indicators (KPIs) requirements. A fundamental component of such networks, and a pivotal factor to the fulfillment of the target KPIs, is the virtual radio access network (vRAN), which allows high flexibility on the control of the radio link. However, to fully exploit the potentiality of vRANs, an efficient mapping of the rapidly varying context to radio control decisions is not only essential, but also challenging owing to the interdependence of user traffic demand, channel conditions, and resource allocation. Here, we propose CAREM, a reinforcement learning framework for dynamic radio resource allocation in heterogeneous vRANs, which selects the best available link and transmission parameters for packet transfer, so as to meet the KPI requirements. To show its effectiveness, we develop a testbed for proof-of-concept. Experimental results demonstrate that CAREM enables an efficient radio resource allocation under different settings and traffic demand. Also, compared to the closest existing scheme based on neural network and the standard LTE, CAREM exhibits an improvement of one order of magnitude in packet loss and latency, while it provides a 65% latency improvement relatively to the contextual bandit approach.
△ Less
Submitted 23 September, 2021; v1 submitted 22 September, 2021;
originally announced September 2021.
-
Eavesdropping with Intelligent Reflective Surfaces: Threats and Defense Strategies
Authors:
Francesco Malandrino,
Alessandro Nordio,
Carla Fabiana Chiasserini
Abstract:
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communications security and privacy. In this work, we focus on this aspect and envision a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users. Unlike most of the existing works addressing passive eavesdro…
▽ More
Intelligent reflecting surfaces (IRSs) have several prominent advantages, including improving the level of wireless communications security and privacy. In this work, we focus on this aspect and envision a strategy to counteract the presence of passive eavesdroppers overhearing transmissions from a base station towards legitimate users. Unlike most of the existing works addressing passive eavesdropping, the strategy we consider has low complexity and is suitable for scenarios where nodes are equipped with a limited number of antennas. Through our performance evaluation, we highlight the trade-off between the legitimate users' data rate and secrecy rate, and how the system parameters affect such a trade-off.
△ Less
Submitted 31 July, 2021;
originally announced August 2021.
-
Edge-powered Assisted Driving For Connected Cars
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gian Michele dell'Aera
Abstract:
Assisted driving for connected cars is one of the main applications that 5G-and-beyond networks shall support. In this work, we propose an assisted driving system leveraging the synergy between connected vehicles and the edge of the network infrastructure, in order to envision global traffic policies that can effectively drive local decisions. Local decisions concern individual vehicles, e.g., whi…
▽ More
Assisted driving for connected cars is one of the main applications that 5G-and-beyond networks shall support. In this work, we propose an assisted driving system leveraging the synergy between connected vehicles and the edge of the network infrastructure, in order to envision global traffic policies that can effectively drive local decisions. Local decisions concern individual vehicles, e.g., which vehicle should perform a lane-change manoeuvre and when; global decisions, instead, involve whole traffic flows. Such decisions are made at different time scales by different entities, which are integrated within an edge-based architecture and can share information. In particular, we leverage a queuing-based model and formulate an optimization problem to make global decisions on traffic flows. To cope with the problem complexity, we then develop an iterative, linear-time complexity algorithm called Bottleneck Hunting (BH). We show the performance of our solution using a realistic simulation framework, integrating a Python engine with ns-3 and SUMO, and considering two relevant services, namely, lane change assistance and navigation, in a real-world scenario. Results demonstrate that our solution leads to a reduction of the vehicles' travel times by 66 in the case of lane change assistance and by 20 for navigation, compared to traditional, local-coordination approaches.
△ Less
Submitted 6 July, 2021;
originally announced July 2021.
-
Towards Node Liability in Federated Learning: Computational Cost and Network Overhead
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Many machine learning (ML) techniques suffer from the drawback that their output (e.g., a classification decision) is not clearly and intuitively connected to their input (e.g., an image). To cope with this issue, several explainable ML techniques have been proposed to, e.g., identify which pixels of an input image had the strongest influence on its classification. However, in distributed scenario…
▽ More
Many machine learning (ML) techniques suffer from the drawback that their output (e.g., a classification decision) is not clearly and intuitively connected to their input (e.g., an image). To cope with this issue, several explainable ML techniques have been proposed to, e.g., identify which pixels of an input image had the strongest influence on its classification. However, in distributed scenarios, it is often more important to connect decisions with the information used for the model training and the nodes supplying such information. To this end, in this paper we focus on federated learning and present a new methodology, named node liability in federated learning (NL-FL), which permits to identify the source of the training information that most contributed to a given decision. After discussing NL-FL's cost in terms of extra computation, storage, and network latency, we demonstrate its usefulness in an edge-based scenario. We find that NL-FL is able to swiftly identify misbehaving nodes and to exclude them from the training process, thereby improving learning accuracy.
△ Less
Submitted 5 July, 2021;
originally announced July 2021.
-
V-Edge: Virtual Edge Computing as an Enabler for Novel Microservices and Cooperative Computing
Authors:
Falko Dressler,
Carla Fabiana Chiasserini,
Frank H. P. Fitzek,
Holger Karl,
Renato Lo Cigno,
Antonio Capone,
Claudio Casetti,
Francesco Malandrino,
Vincenzo Mancuso,
Florian Klingler,
Gianluca Rizzo
Abstract:
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as p…
▽ More
As we move from 5G to 6G, edge computing is one of the concepts that needs revisiting. Its core idea is still intriguing: instead of sending all data and tasks from an end user's device to the cloud, possibly covering thousands of kilometers and introducing delays that are just owed to limited propagation speed, edge servers deployed in close proximity to the user, e.g., at some 5G gNB, serve as proxy for the cloud. Yet this promising idea is hampered by the limited availability of such edge servers. In this paper, we discuss a way forward, namely the virtual edge computing (V-Edge) concept. V-Edge bridges the gap between cloud, edge, and fog by virtualizing all available resources including the end users' devices and making these resources widely available using well-defined interfaces. V-Edge also acts as an enabler for novel microservices as well as cooperative computing solutions. We introduce the general V-Edge architecture and we characterize some of the key research challenges to overcome, in order to enable wide-spread and even more powerful edge services.
△ Less
Submitted 18 June, 2021;
originally announced June 2021.
-
Dynamic VNF Placement, Resource Allocation and Traffic Routing in 5G
Authors:
Morteza Golkarifard,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Ali Movaghar
Abstract:
5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accoun…
▽ More
5G networks are going to support a variety of vertical services, with a diverse set of key performance indicators (KPIs), by using enabling technologies such as software-defined networking and network function virtualization. It is the responsibility of the network operator to efficiently allocate the available resources to the service requests in such a way to honor KPI requirements, while accounting for the limited quantity of available resources and their cost. A critical challenge is that requests may be highly varying over time, requiring a solution that accounts for their dynamic generation and termination. With this motivation, we seek to make joint decisions for request admission, resource activation, VNF placement, resource allocation, and traffic routing. We do so by considering real-world aspects such as the setup times of virtual machines, with the goal of maximizing the mobile network operator profit. To this end, first, we formulate a one-shot optimization problem which can attain the optimum solution for small size problems given the complete knowledge of arrival and departure times of requests over the entire system lifespan. We then propose an efficient and practical heuristic solution that only requires this knowledge for the next time period and works for realistically-sized scenarios. Finally, we evaluate the performance of these solutions using real-world services and large-scale network topologies. {Results demonstrate that our heuristic solution performs better than a state-of-the-art online approach and close to the optimum.
△ Less
Submitted 18 February, 2021;
originally announced February 2021.
-
Network Support for High-performance Distributed Machine Learning
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Nuria Molner,
Antonio De La Oliva
Abstract:
The traditional approach to distributed machine learning is to adapt learning algorithms to the network, e.g., reducing updates to curb overhead. Networks based on intelligent edge, instead, make it possible to follow the opposite approach, i.e., to define the logical network topology em around the learning task to perform, so as to meet the desired learning performance. In this paper, we propose…
▽ More
The traditional approach to distributed machine learning is to adapt learning algorithms to the network, e.g., reducing updates to curb overhead. Networks based on intelligent edge, instead, make it possible to follow the opposite approach, i.e., to define the logical network topology em around the learning task to perform, so as to meet the desired learning performance. In this paper, we propose a system model that captures such aspects in the context of supervised machine learning, accounting for both learning nodes (that perform computations) and information nodes (that provide data). We then formulate the problem of selecting (i) which learning and information nodes should cooperate to complete the learning task, and (ii) the number of iterations to perform, in order to minimize the learning cost while meeting the target prediction error and execution time. After proving important properties of the above problem, we devise an algorithm, named DoubleClimb, that can find a 1+1/|I|-competitive solution (with I being the set of information nodes), with cubic worst-case complexity. Our performance evaluation, leveraging a real-world network topology and considering both classification and regression tasks, also shows that DoubleClimb closely matches the optimum, outperforming state-of-the-art alternatives.
△ Less
Submitted 5 July, 2022; v1 submitted 5 February, 2021;
originally announced February 2021.
-
Federated Learning at the Network Edge: When Not All Nodes are Created Equal
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
Under the federated learning paradigm, a set of nodes can cooperatively train a machine learning model with the help of a centralized server. Such a server is also tasked with assigning a weight to the information received from each node, and often also to drop too-slow nodes from the learning process. Both decisions have major impact on the resulting learning performance, and can interfere with e…
▽ More
Under the federated learning paradigm, a set of nodes can cooperatively train a machine learning model with the help of a centralized server. Such a server is also tasked with assigning a weight to the information received from each node, and often also to drop too-slow nodes from the learning process. Both decisions have major impact on the resulting learning performance, and can interfere with each other in counterintuitive ways. In this paper, we focus on edge networking scenarios and investigate existing and novel approaches to such model-weighting and node-dropping decisions. Leveraging a set of real-world experiments, we find that popular, straightforward decision-making approaches may yield poor performance, and that considering the quality of data in addition to its quantity can substantially improve learning.
△ Less
Submitted 3 February, 2021; v1 submitted 6 January, 2021;
originally announced January 2021.
-
I-Health: Leveraging Edge Computing and Blockchain for Epidemic Management
Authors:
Alaa Awad Abdellatif,
Lutfi Samara,
Amr Mohamed,
Aiman Erbad,
Carla Fabiana Chiasserini,
Mohsen Guizani,
Mark Dennis O'Connor,
James Laughton
Abstract:
Epidemic situations typically demand intensive data collection and management from different locations/entities within a strict time constraint. Such demand can be fulfilled by leveraging the intensive and easy deployment of the Internet of Things (IoT) devices. The management and containment of such situations also rely on cross-organizational and national collaboration. Thus, this paper proposes…
▽ More
Epidemic situations typically demand intensive data collection and management from different locations/entities within a strict time constraint. Such demand can be fulfilled by leveraging the intensive and easy deployment of the Internet of Things (IoT) devices. The management and containment of such situations also rely on cross-organizational and national collaboration. Thus, this paper proposes an Intelligent-Health (I-Health) system that aims to aggregate diverse e-health entities in a unique national healthcare system by enabling swift, secure exchange and storage of medical data. In particular, we design an automated patients monitoring scheme, at the edge, which enables the prompt discovery, remote monitoring, and fast emergency response for critical medical events, such as emerging epidemics. Furthermore, we develop a blockchain optimization model that aims to optimize medical data sharing between different health entities to provide effective and secure health services. Finally, we show the effectiveness of our system, in adapting to different critical events, while highlighting the benefits of the proposed I-Health system.
△ Less
Submitted 18 December, 2020;
originally announced December 2020.
-
Scheduling of Emergency Tasks for Multiservice UAVs in Post-Disaster Scenarios
Authors:
Cristina Rottondi,
Francesco Malandrino,
Andrea Bianco,
Carla Fabiana Chiasserini,
Ioannis Stavrakakis
Abstract:
Single-task UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication support, and other specific tasks. When the geographical area of operation of single-task missions is common, e.g., in post-disaster recovery scenarios, it is more efficient to have multiple tasks carried out as part of a single UAV mission. In these scenarios, the UAVs' equipment and mission…
▽ More
Single-task UAVs are increasingly being employed to carry out surveillance, parcel delivery, communication support, and other specific tasks. When the geographical area of operation of single-task missions is common, e.g., in post-disaster recovery scenarios, it is more efficient to have multiple tasks carried out as part of a single UAV mission. In these scenarios, the UAVs' equipment and mission plan must be carefully selected to minimize the carried load and overall resource consumption. In this paper, we investigate the joint planning of multitask missions leveraging a fleet of UAVs equipped with a standard set of accessories enabling heterogeneous tasks. To this end, an optimization problem is formulated yielding the optimal joint planning and deriving the resulting quality of the delivered tasks. In addition, two heuristic solutions are developed for large-scale environments to cope with the increased complexity of the optimization framework. The joint planning is applied to a specific scenario of a flood in the San Francisco area. Results show the effectiveness of the proposed heuristic solutions, which provide good performance and allow for drastic savings in the computational time required to plan the UAVs' trajectories with respect to the optimal approach, thus enabling prompt reaction to the emergency events.
△ Less
Submitted 20 October, 2020;
originally announced October 2020.
-
An Edge-powered Approach to Assisted Driving
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gian Michele Dell'Aera
Abstract:
Automotive services for connected vehicles are one of the main fields of application for new-generation mobile networks as well as for the edge computing paradigm. In this paper, we investigate a system architecture that integrates the distributed vehicular network with the network edge, with the aim to optimize the vehicle travel times. We then present a queue-based system model that permits the…
▽ More
Automotive services for connected vehicles are one of the main fields of application for new-generation mobile networks as well as for the edge computing paradigm. In this paper, we investigate a system architecture that integrates the distributed vehicular network with the network edge, with the aim to optimize the vehicle travel times. We then present a queue-based system model that permits the optimization of the vehicle flows, and we show its applicability to two relevant services, namely, lane change/merge (representative of cooperative assisted driving) and navigation. Furthermore, we introduce an efficient algorithm called Bottleneck Hunting (BH), able to formulate high-quality flow policies in linear time. We assess the performance of the proposed system architecture and of BH through a comprehensive and realistic simulation framework, combining ns-3 and SUMO. The results, derived under real-world scenarios, show that our solution provides much shorter travel times than when decisions are made by individual vehicles.
△ Less
Submitted 21 August, 2020;
originally announced August 2020.
-
Graph-based Model for Beam Management in Mmwave Vehicular Networks
Authors:
Zana Limani Fazliu,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Alessandro Nordio
Abstract:
Mmwave bands are being widely touted as a very promising option for future 5G networks, especially in enabling such networks to meet highly demanding rate requirements. Accordingly, the usage of these bands is also receiving an increasing interest in the context of 5G vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Mmwave c…
▽ More
Mmwave bands are being widely touted as a very promising option for future 5G networks, especially in enabling such networks to meet highly demanding rate requirements. Accordingly, the usage of these bands is also receiving an increasing interest in the context of 5G vehicular networks, where it is expected that connected cars will soon need to transmit and receive large amounts of data. Mmwave communications, however, require the link to be established using narrow directed beams, to overcome harsh propagation conditions. The advanced antenna systems enabling this also allow for a complex beam design at the base station, where multiple beams of different widths can be set up. In this work, we focus on beam management in an urban vehicular network, using a graph-based approach to model the system characteristics and the existing constraints. In particular, unlike previous work, we formulate the beam design problem as a maximum-weight matching problem on a bipartite graph with conflicts, and then we solve it using an efficient heuristic algorithm. Our results show that our approach easily outperforms advanced methods based on clustering algorithms.
△ Less
Submitted 21 July, 2020;
originally announced July 2020.
-
SSHealth: Toward Secure, Blockchain-Enabled Healthcare Systems
Authors:
Alaa Awad Abdellatif,
Abeer Z. Al-Marridi,
Amr Mohamed,
Aiman Erbad,
Carla Fabiana Chiasserini,
Ahmed Refaey
Abstract:
The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system levels, new practices can be introduced, offering a radical improvement to healthcare services. This paper presents a novel smart and secure Healthcare system (ssHealth), which…
▽ More
The future of healthcare systems is being shaped by incorporating emerged technological innovations to drive new models for patient care. By acquiring, integrating, analyzing, and exchanging medical data at different system levels, new practices can be introduced, offering a radical improvement to healthcare services. This paper presents a novel smart and secure Healthcare system (ssHealth), which, leveraging advances in edge computing and blockchain technologies, permits epidemics discovering, remote monitoring, and fast emergency response. The proposed system also allows for secure medical data exchange among local healthcare entities, thus realizing the integration of multiple national and international entities and enabling the correlation of critical medical events for, e.g., emerging epidemics management and control. In particular, we develop a blockchain-based architecture and enable a flexible configuration thereof, which optimize medical data sharing between different health entities and fulfil the diverse levels of Quality of Service (QoS) that ssHealth may require. Finally, we highlight the benefits of the proposed ssHealth system and possible directions for future research.
△ Less
Submitted 18 June, 2020;
originally announced June 2020.
-
Mmwave Beam Management in Urban Vehicular Networks
Authors:
Zana Limani,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Alessandro Nordio
Abstract:
Millimeter-wave (mmwave) communication represents a potential solution to capacity shortage in vehicular networks. However, effective beam alignment between senders and receivers requires accurate knowledge of the vehicles' position for fast beam steering, which is often impractical to obtain in real time. We address this problem by leveraging the traffic signals regulating vehicular mobility: as…
▽ More
Millimeter-wave (mmwave) communication represents a potential solution to capacity shortage in vehicular networks. However, effective beam alignment between senders and receivers requires accurate knowledge of the vehicles' position for fast beam steering, which is often impractical to obtain in real time. We address this problem by leveraging the traffic signals regulating vehicular mobility: as an example, we may coordinate beams with red traffic lights, as they correspond to higher vehicle densities and lower speeds. To evaluate our intuition, we propose a tractable, yet accurate, mmwave communication model accounting for both the distance and the heading of vehicles being served. Using such a model, we optimize the beam design and define a low-complexity, heuristic strategy. For increased realism, we consider as reference scenario a large-scale, real-world mobility trace of vehicles in Luxembourg. The results show that our approach closely matches the optimum and always outperforms static beam design based on road topology alone. Remarkably, it also yields better performance than solutions based on real-time mobility information.
△ Less
Submitted 19 May, 2020;
originally announced May 2020.
-
Edge Computing For Smart Health: Context-aware Approaches, Opportunities, and Challenges
Authors:
Alaa Awad Abdellatif,
Amr Mohamed,
Carla Fabiana Chiasserini,
Mounira Tlili,
Aiman Erbad
Abstract:
Improving efficiency of healthcare systems is a top national interest worldwide. However, the need of delivering scalable healthcare services to the patients while reducing costs is a challenging issue. Among the most promising approaches for enabling smart healthcare (s-health) are edge-computing capabilities and next-generation wireless networking technologies that can provide real-time and cost…
▽ More
Improving efficiency of healthcare systems is a top national interest worldwide. However, the need of delivering scalable healthcare services to the patients while reducing costs is a challenging issue. Among the most promising approaches for enabling smart healthcare (s-health) are edge-computing capabilities and next-generation wireless networking technologies that can provide real-time and cost-effective patient remote monitoring. In this paper, we present our vision of exploiting multi-access edge computing (MEC) for s-health applications. We envision a MEC-based architecture and discuss the benefits that it can bring to realize in-network and context-aware processing so that the s-health requirements are met. We then present two main functionalities that can be implemented leveraging such an architecture to provide efficient data delivery, namely, multimodal data compression and edge-based feature extraction for event detection. The former allows efficient and low distortion compression, while the latter ensures high-reliability and fast response in case of emergency applications. Finally, we discuss the main challenges and opportunities that edge computing could provide and possible directions for future research.
△ Less
Submitted 15 April, 2020;
originally announced April 2020.
-
Active Learning-based Classification in Automated Connected Vehicles
Authors:
Alaa Awad Abdellatif,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Machine learning has emerged as a promising paradigm for enabling connected, automated vehicles to autonomously cruise the streets and react to unexpected situations. A key challenge, however, is to collect and select real-time and reliable information for the correct classification of unexpected, and often rare, situations that may happen on the road. Indeed, the data generated by vehicles, or re…
▽ More
Machine learning has emerged as a promising paradigm for enabling connected, automated vehicles to autonomously cruise the streets and react to unexpected situations. A key challenge, however, is to collect and select real-time and reliable information for the correct classification of unexpected, and often rare, situations that may happen on the road. Indeed, the data generated by vehicles, or received from neighboring vehicles, may be affected by errors or have different levels of resolution and freshness. To tackle this challenge, we propose an active learning framework that, leveraging the information collected through onboard sensors as well as received from other vehicles, effectively deals with scarce and noisy data. In particular, given the available information, our solution selects the data to add to the training set by trading off between two essential features, namely, quality and diversity. The results, obtained using real-world data sets, show that the proposed method significantly outperforms state-of-the-art solutions, providing high classification accuracy at the cost of a limited bandwidth requirement for the data exchange between vehicles.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Characterizing Delay and Control Traffic of the Cellular MME with IoT Support
Authors:
Christian Vitale,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Senay Semu Tadesse
Abstract:
One of the main use cases for advanced cellular networks is represented by massive Internet-of-things (MIoT), i.e., an enormous number of IoT devices that transmit data toward the cellular network infrastructure. To make cellular MIoT a reality, data transfer and control procedures specifically designed for the support of IoT are needed. For this reason, 3GPP has introduced the Control Plane Cellu…
▽ More
One of the main use cases for advanced cellular networks is represented by massive Internet-of-things (MIoT), i.e., an enormous number of IoT devices that transmit data toward the cellular network infrastructure. To make cellular MIoT a reality, data transfer and control procedures specifically designed for the support of IoT are needed. For this reason, 3GPP has introduced the Control Plane Cellular IoT optimization, which foresees a simplified bearer instantiation, with the Mobility Management Entity (MME) handling both control and data traffic. The performance of the MME has therefore become critical, and properly scaling its computational capability can determine the ability of the whole network to tackle MIoT effectively. In particular, considering virtualized networks and the need for an efficient allocation of computing resources, it is paramount to characterize the MME performance as the MIoT traffic load changes. We address this need by presenting compact, closed-form expressions linking the number of IoT sources with the rate at which bearers are requested, and such a rate with the delay incurred by the IoT data. We show that our analysis, supported by testbed experiments and verified through large-scale simulations, represents a valuable tool to make effective scaling decisions in virtualized cellular core networks.
△ Less
Submitted 1 January, 2020;
originally announced January 2020.
-
OKpi: All-KPI Network Slicing Through Efficient Resource Allocation
Authors:
Jorge {Martín-Pérez},
Francesco Malandrino,
Carla Fabiana Chiasserini,
Carlos J. Bernardos
Abstract:
Networks can now process data as well as transporting it; it follows that they can support multiple services, each requiring different key performance indicators (KPIs). Because of the former, it is critical to efficiently allocate network and computing resources to provide the required services, and, because of the latter, such decisions must jointly consider all KPIs targeted by a service. Accou…
▽ More
Networks can now process data as well as transporting it; it follows that they can support multiple services, each requiring different key performance indicators (KPIs). Because of the former, it is critical to efficiently allocate network and computing resources to provide the required services, and, because of the latter, such decisions must jointly consider all KPIs targeted by a service. Accounting for newly introduced KPIs (e.g., availability and reliability) requires tailored models and solution strategies, and has been conspicuously neglected by existing works, which are instead built around traditional metrics like throughput and latency. We fill this gap by presenting a novel methodology and resource allocation scheme, named OKpi, which enables high-quality selection of radio points of access as well as VNF (Virtual Network Function) placement and data routing, with polynomial computational complexity. OKpi accounts for all relevant KPIs required by each service, and for any available resource from the fog to the cloud. We prove several important properties of OKpi and evaluate its performance in two real-world scenarios, finding it to closely match the optimum.
△ Less
Submitted 6 December, 2019;
originally announced December 2019.
-
Edge-Based Collision Avoidance for Vehicles and Vulnerable Users: An Architecture Based on MEC
Authors:
Marco Malinverno,
Giuseppe Avino,
Claudio Casetti,
Carla Fabiana Chiasserini,
Francesco Malandrino,
Salvatore Scarpina
Abstract:
Collision avoidance is one of the most promising applications for vehicular networks, dramatically improving the safety of the vehicles that support it. In this paper, we investigate how it can be extended to benefit vulnerable users, e.g., pedestrians and bicycles, equipped with a smartphone. We argue that, owing to the reduced capabilities of smartphones compared to vehicular on-board units, tra…
▽ More
Collision avoidance is one of the most promising applications for vehicular networks, dramatically improving the safety of the vehicles that support it. In this paper, we investigate how it can be extended to benefit vulnerable users, e.g., pedestrians and bicycles, equipped with a smartphone. We argue that, owing to the reduced capabilities of smartphones compared to vehicular on-board units, traditional distributed approaches are not viable, and that multi-access edge computing (MEC) support is needed. Thus, we propose a MEC-based collision avoidance system, discussing its architecture and evaluating its performance. We find that, thanks to MEC, we are able to extend the protection of collision avoidance, traditionally thought for vehicles, to vulnerable users without impacting its effectiveness or latency.
△ Less
Submitted 6 January, 2021; v1 submitted 13 November, 2019;
originally announced November 2019.
-
Opinion Dynamics on Correlated Subjects in Social Networks
Authors:
Alessandro Nordio,
Alberto Tarable,
Carla Fabiana Chiasserini,
Emilio Leonardi
Abstract:
Understanding the evolution of collective beliefs is of critical importance to get insights on the political trends as well as on social tastes and opinions. In particular, it is pivotal to develop analytical models that can predict the beliefs dynamics and capture the interdependence of opinions on different subjects. In this paper we tackle this issue also accounting for the individual endogenou…
▽ More
Understanding the evolution of collective beliefs is of critical importance to get insights on the political trends as well as on social tastes and opinions. In particular, it is pivotal to develop analytical models that can predict the beliefs dynamics and capture the interdependence of opinions on different subjects. In this paper we tackle this issue also accounting for the individual endogenous process of opinion evolution, as well as repulsive interactions between individuals' opinions that may arise in the presence of an adversarial attitude of the individuals. Using a mean field approach, we characterize the time evolution of opinions of a large population of individuals through a multidimensional Fokker-Planck equation, and we identify the conditions under which stability holds. Finally, we derive the steady-state opinion distribution as a function of the individuals' personality and of the existing social interactions. Our numerical results show interesting dynamics in the collective beliefs of different social communities, and they highlight the effect of correlated subjects as well as of individuals with an adversarial attitude.
△ Less
Submitted 24 October, 2019;
originally announced October 2019.
-
Reducing Service Deployment Cost Through VNF Sharing
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Gil Einziger,
Gabriel Scalosub
Abstract:
Thanks to its computational and forwarding capabilities, the mobile network infrastructure can support several third-party ("vertical") services, each composed of a graph of virtual (network) functions (VNFs). Importantly, one or more VNFs are often common to multiple services, thus the services deployment cost could be reduced by letting the services share the same VNF instance instead of devotin…
▽ More
Thanks to its computational and forwarding capabilities, the mobile network infrastructure can support several third-party ("vertical") services, each composed of a graph of virtual (network) functions (VNFs). Importantly, one or more VNFs are often common to multiple services, thus the services deployment cost could be reduced by letting the services share the same VNF instance instead of devoting a separate instance to each service. By doing that, however, it is critical that the target KPI (key performance indicators) of all services are met. To this end, we study the VNF sharing problem and make decisions on (i) when sharing VNFs among multiple services is possible, (ii) how to adapt the virtual machines running the shared VNFs to the combined load of the assigned services, and (iii) how to prioritize the services traffic within shared VNFs. All decisions aim to minimize the cost for the mobile operator, subject to requirements on end-to-end service performance, e.g., total delay. Notably, we show that the aforementioned priorities should be managed dynamically and vary across VNFs. We then propose the FlexShare algorithm to provide near-optimal VNF-sharing and priority assignment decisions in polynomial time. We prove that FlexShare is within a constant factor from the optimum and, using real-world VNF graphs, we show that it consistently outperforms baseline solutions.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
The RICH Prefetching in Edge Caches for In-Order Delivery to Connected Cars
Authors:
Ahsan Mahmood,
Claudio Casetti,
Carla Fabiana Chiasserini,
Paolo Giaccone,
Jerome Haerri
Abstract:
Content caching on the edge of 5G networks is an emerging and critical feature to quench the thirst for content of future connected cars. However, the tight packaging of 5G cells, the finite storage capacity at the edge, and the need for content availability while driving motivate the need to develop smart edge caching strategies adapted to the mobility characteristics of connected cars. In this p…
▽ More
Content caching on the edge of 5G networks is an emerging and critical feature to quench the thirst for content of future connected cars. However, the tight packaging of 5G cells, the finite storage capacity at the edge, and the need for content availability while driving motivate the need to develop smart edge caching strategies adapted to the mobility characteristics of connected cars. In this paper, we propose a scheme called RICH (RoadsIde CacHe), which optimally caches content at edge nodes where connected vehicles require it most. In particular, our scheme is designed to ensure in-order delivery of content chunks to end users. Unlike blind popularity decisions, the probabilistic caching used by RICH accounts for the user mobility information that the system can realistically acquire. Furthermore, we provide a complete system architecture and define the protocols through which the different system entities can interact. We assess the performance of our approach against state-of-the-art solutions, under realistic mobility datasets and system scenarios. Our RICH edge caching scheme improves significantly the content availability at the caches and reduces the required backhaul bandwidth, with beneficial effects for both the end users and the network operators.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
5G Traffic Forecasting: If Verticals and Mobile Operators Cooperate
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini
Abstract:
In 5G research, it is traditionally assumed that vertical industries (a.k.a verticals) set the performance requirements for the services they want to offer to mobile users, and the mobile operators alone are in charge of orchestrating their resources so as to meet such requirements. Motivated by the observation that successful orchestration requires reliable traffic predictions, in this paper we i…
▽ More
In 5G research, it is traditionally assumed that vertical industries (a.k.a verticals) set the performance requirements for the services they want to offer to mobile users, and the mobile operators alone are in charge of orchestrating their resources so as to meet such requirements. Motivated by the observation that successful orchestration requires reliable traffic predictions, in this paper we investigate the effects of having the verticals, instead of the mobile operators, performing such predictions. Leveraging a real-world, large-scale, crowd-sourced trace, we find that involving the verticals in the prediction process reduces the prediction errors and improves the quality of the resulting orchestration decisions.
△ Less
Submitted 1 January, 2019;
originally announced January 2019.
-
VNF Placement and Resource Allocation for the Support of Vertical Services in 5G Networks
Authors:
Satyam Agarwal,
Francesco Malandrino,
Carla Fabiana Chiasserini,
Swades De
Abstract:
One of the main goals of 5G networks is to support the technological and business needs of various industries (the so-called verticals), which wish to offer to their customers a wide range of services characterized by diverse performance requirements. In this context, a critical challenge lies in mapping in an automated manner the requirements of verticals into decisions concerning the network inf…
▽ More
One of the main goals of 5G networks is to support the technological and business needs of various industries (the so-called verticals), which wish to offer to their customers a wide range of services characterized by diverse performance requirements. In this context, a critical challenge lies in mapping in an automated manner the requirements of verticals into decisions concerning the network infrastructure, including VNF placement, resource assignment, and traffic routing. In this paper, we seek to make such decisions jointly, accounting for their mutual interaction, and efficiently. To this end, we formulate a queuing-based model and use it at the network orchestrator to optimally match the vertical's requirements to the available system resources. We then propose a fast and efficient solution strategy, called MaxZ, which allows us to reduce the solution complexity. Our performance evaluation, carried out accounting for multiple scenarios representative of real-world services, shows that MaxZ performs substantially better than state-of-the-art alternatives and consistently close to the optimum.
△ Less
Submitted 29 December, 2018;
originally announced December 2018.
-
From Megabits to CPU~Ticks: Enriching a Demand Trace in the Age of MEC
Authors:
Francesco Malandrino,
Carla Fabiana Chiasserini,
Giuseppe Avino,
Marco Malinverno,
Scott Kirkpatrick
Abstract:
All the content consumed by mobile users, be it a web page or a live stream, undergoes some processing along the way; as an example, web pages and videos are transcoded to fit each device's screen. The recent multi-access edge computing (MEC) paradigm envisions performing such processing within the cellular network, as opposed to resorting to a cloud server on the Internet. Designing a MEC network…
▽ More
All the content consumed by mobile users, be it a web page or a live stream, undergoes some processing along the way; as an example, web pages and videos are transcoded to fit each device's screen. The recent multi-access edge computing (MEC) paradigm envisions performing such processing within the cellular network, as opposed to resorting to a cloud server on the Internet. Designing a MEC network, i.e., placing and dimensioning the computational facilities therein, requires information on how much computational power is required to produce the contents needed by the users. However, real-world demand traces only contain information on how much data is downloaded. In this paper, we demonstrate how to {\em enrich} demand traces with information about the computational power needed to process the different types of content, and we show the substantial benefit that can be obtained from using such enriched traces for the design of MEC-based networks.
△ Less
Submitted 23 September, 2018;
originally announced September 2018.
-
Characterizing the Power Cost of Virtualization Environments
Authors:
Senay Semu Tadesse,
Carla Fabiana Chiasserini,
Francesco Malandrino
Abstract:
Virtualization is a key building block of next-generation mobile networks. It can be implemented through two main approaches: traditional virtual machines and lighter-weight containers. Our objective in this paper is to compare these approaches and study the power consumption they are associated with. To this end, we perform a large set of real-world measurements, using both synthetic workloads an…
▽ More
Virtualization is a key building block of next-generation mobile networks. It can be implemented through two main approaches: traditional virtual machines and lighter-weight containers. Our objective in this paper is to compare these approaches and study the power consumption they are associated with. To this end, we perform a large set of real-world measurements, using both synthetic workloads and real-world applications, and use them to model the relationship between the resource usage of the hosted application and the power consumption of both virtual machines and containers hosting it. We find that containers incur substantially lower power consumption than virtual machines, and that such consumption increases more slowly with the application load.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.