30 research outputs found

    Anomaly detection mechanisms to find social events using cellular traffic data

    Get PDF
    The design of new tools to detect on-the-fly traffic anomaly without scalability problems is a key point to exploit the cellular system for monitoring social activities. To this goal, the paper proposes two methods based on the wavelet analysis of the cumulative cellular traffic. The utilisation of the wavelets permits to easily filter “normal” traffic anomalies such as the periodic trends present in the cellular traffic. The two presented approaches, denoted as Spatial Analysis (SA) and Time Analysis (TA), differ on how they consider the spatial information of the traffic data. We examine the performance of the considered algorithms using cellular traffic data acquired from one the most important Italian Mobile Network Operator in the city of Milan throughout December 2013. The results highlight the weak points of TA and some important features of SA. Both approaches overcome the performance of one reference algorithm present in literature. The strategy used in the SA emerges as the most suitable for exploiting the spatial correlation when we aim at the detection of the traffic anomaly focused on the localisation of social events

    5G Multi-access Edge Computing: Security, Dependability, and Performance

    Full text link
    The main innovation of the Fifth Generation (5G) of mobile networks is the ability to provide novel services with new and stricter requirements. One of the technologies that enable the new 5G services is the Multi-access Edge Computing (MEC). MEC is a system composed of multiple devices with computing and storage capabilities that are deployed at the edge of the network, i.e., close to the end users. MEC reduces latency and enables contextual information and real-time awareness of the local environment. MEC also allows cloud offloading and the reduction of traffic congestion. Performance is not the only requirement that the new 5G services have. New mission-critical applications also require high security and dependability. These three aspects (security, dependability, and performance) are rarely addressed together. This survey fills this gap and presents 5G MEC by addressing all these three aspects. First, we overview the background knowledge on MEC by referring to the current standardization efforts. Second, we individually present each aspect by introducing the related taxonomy (important for the not expert on the aspect), the state of the art, and the challenges on 5G MEC. Finally, we discuss the challenges of jointly addressing the three aspects.Comment: 33 pages, 11 figures, 15 tables. This paper is under review at IEEE Communications Surveys & Tutorials. Copyright IEEE 202

    Experimental comparison of migration strategies for MEC-assisted 5G-V2X applications

    Get PDF
    The introduction of 5G technology enables new V2X services requiring reliable and extremely low latency communications. To satisfy these requirements computing elements need to be located at the edge of the network, according to the Multi-access Edge Computing (MEC) paradigm. The user mobility and the MEC approach lead to the need to carefully analysing the procedures for the migration of applications necessary to maintain the service proximity, fundamental to guarantee low latency. The paper provides an experimental comparison of three different migration strategies. The comparison is performed considering three different containerized MEC applications that can be used for developing V2X services. The experimental study is carried out by means of a testbed where the user mobility is emulated by the ETSI MEC Sandbox. The three strategies are compared considering the viability, the observed service downtime, and the amount of state preserved after the migration. The obtained results point out some trade-offs to consider in any migration scenario.acceptedVersio

    5G-MEC Testbeds for V2X Applications

    Get PDF
    Fifth-generation (5G) mobile networks fulfill the demands of critical applications, such as Ultra-Reliable Low-Latency Communication (URLLC), particularly in the automotive industry. Vehicular communication requires low latency and high computational capabilities at the network’s edge. To meet these requirements, ETSI standardized Multi-access Edge Computing (MEC), which provides cloud computing capabilities and addresses the need for low latency. This paper presents a generalized overview for implementing a 5G-MEC testbed for Vehicle-to-Everything (V2X) applications, as well as the analysis of some important testbeds and state-of-the-art implementations based on their deployment scenario, 5G use cases, and open source accessibility. The complexity of using the testbeds is also discussed, and the challenges researchers may face while replicating and deploying them are highlighted. Finally, the paper summarizes the tools used to build the testbeds and addresses open issues related to implementing the testbeds.publishedVersio

    The impact of the access point power model on the energy-efficient management of infrastructured wireless LANs

    Get PDF
    The reduction of the energy footprint of large and mid-sized IEEE 802.11 access networks is gaining momentum. When operating at the network management level, the availability of an accurate power model of the APs becomes of paramount importance, because different detail levels have a non-negligible impact on the performance of the optimisation algorithms. The literature is plentiful of AP power models, and choosing the right one is not an easy task. In this paper we report the outcome of a thorough study on the impact that various inflections of the AP power model have when minimising the energy consumption of the infrastructure side of an enterprise wireless LAN. Our study, performed on several network scenarios and for various device energy profiles, reveals that simple one- and two-component models can provide excellent results in practically all cases. Conversely, employing accurate and detailed power models rarely offers substantial advantages in terms of power reduction, but, on the other hand, makes the solving algorithms much slower to execute

    Experimental Evaluation of a SIP-Based Home Gateway with Multiple Wireless Interfaces for Domotics Systems

    Get PDF
    In modern houses, the presence of sensors and actuators is increasing, whilecommunication servicesandentertainment systemshad long since settled into everyday life. The utilization of wireless communication technologies, such as ZigBee, Wi-Fi, and Bluetooth, is attractive because of their short installation times and low costs. The research is moving towards the integration of the various home appliances and devices into a single domotics system, able to exploit the cooperation among the diverse subsystems and offer the end-user a single multiservice platform. In this scenario, the paper presents the experimental evaluation of a domotics framework centered on a SIP-based home gateway (SHG). While SIP is used to build a common control plane, the SHG is in charge of translating the user commands from and to the specific domotics languages. The analysis has been devoted to assess both the performance of the SHG software framework and the negative effects produced by the simultaneous interference among the three widespread wireless technologies

    Joint multi-objective MEH selection and traffic path computation in 5G-MEC systems

    Get PDF
    Multi-access Edge Computing (MEC) is an emerging technology that allows to reduce the service latency and traffic congestion and to enable cloud offloading and context awareness. MEC consists in deploying computing devices, called MEC Hosts (MEHs), close to the user. Given the mobility of the user, several problems rise. The first problem is to select a MEH to run the service requested by the user. Another problem is to select the path to steer the traffic from the user to the selected MEH. The paper jointly addresses these two problems. First, the paper proposes a procedure to create a graph that is able to capture both network-layer and application-layer performance. Then, the proposed graph is used to apply the Multi-objective Dijkstra Algorithm (MDA), a technique used for multi-objective optimization problems, in order to find solutions to the addressed problems by simultaneously considering different performance metrics and constraints. To evaluate the performance of MDA, the paper implements a testbed based on AdvantEDGE and Kubernetes to migrate a VideoLAN application between two MEHs. A controller has been realized to integrate MDA with the 5G-MEC system in the testbed. The results show that MDA is able to perform the migration with a limited impact on the network performance and user experience. The lack of migration would instead lead to a severe reduction of the user experience.publishedVersio

    Experimental Evaluation of Handover Strategies in 5G-MEC Scenario by using AdvantEDGE

    Get PDF
    The 5G-MEC architecture increases the heterogene-ity and dynamicity of the available resources, presenting unique and competing challenges to researchers, network designers, and application developers. Recent studies indicate AdvantEDGE as an interesting emulation platform to investigate these challenges. The paper presents a particular example of AdvantEDGE usage. A testbed composed of the emulated 5G-MEC architecture and the VideoLAN application allows to analyse the performance of alternative handover strategies, developed by using a multi-objective approach. The study shows how AdvantEDGE allows a deep analysis of the behaviour of the different strategies during the emulated user mobility, giving the possibility of measuring performance parameters at different layers, i.e. IP, application, and end-user

    Power-Aware Routing and Network Design with Bundled Links: Solutions and Analysis

    Get PDF
    The paper deeply analyzes a novel network-wide power management problem, called Power-Aware Routing and Network Design with Bundled Links (PARND-BL), which is able to take into account both the relationship between the power consumption and the traffic throughput of the nodes and to power off both the chassis and even the single Physical Interface Card (PIC) composing each link. The solutions of the PARND-BL model have been analyzed by taking into account different aspects associated with the actual applicability in real network scenarios: (i) the time for obtaining the solution, (ii) the deployed network topology and the resulting topology provided by the solution, (iii) the power behavior of the network elements, (iv) the traffic load, (v) the QoS requirement, and (vi) the number of paths to route each traffic demand. Among the most interesting and novel results, our analysis shows that the strategy of minimizing the number of powered-on network elements through the traffic consolidation does not always produce power savings, and the solution of this kind of problems, in some cases, can lead to spliting a single traffic demand into a high number of paths

    An Experimental Cross-Layer Approach to Improve the Vertical Handover Procedure in Heterogeneous Wireless Networks

    Get PDF
    Users of next generation wireless devices will be likely to move across a heterogeneous network environment. This will give them the possibility to always exploit the best connection to the global Internet. In order to keep a seamless connection, the handover between different access technologies, also known as vertical handover, must be as smooth as possible. The current evolution of network architectures toward an all-IP core favours the use of the Mobile IPv6 protocol to handle such handovers. However, this protocol still presents several drawbacks, mainly related to the assumption of static devices and wired connections. Hence we have designed and implemented a software module that exploits information from the lower layers (e.g. physical) to extend the capabilities of Mobile IPv6 to wireless environments. We have then evaluated both the plain Mobile IPv6 and our proposed implementation over an experimental testbed. The outcome of the assessment proves the effectiveness of our solution and reveals the possibility to perform a seamless vertical handover in heterogeneous wireless networks
    corecore