Jing Li, W. Liang, Wenzheng Xu, Zichuan Xu, Jin Zhao
{"title":"Maximizing the Quality of User Experience of Using Services in Edge Computing for Delay-Sensitive IoT Applications","authors":"Jing Li, W. Liang, Wenzheng Xu, Zichuan Xu, Jin Zhao","doi":"10.1145/3416010.3423234","DOIUrl":"https://doi.org/10.1145/3416010.3423234","url":null,"abstract":"The Internet of Things (IoT) technology offers unprecedented opportunities to interconnect human beings. However, the latency brought by unstable wireless networks and computation failures caused by limited resources on IoT devices prevents users from experiencing high efficiency and seamless user experience. To address these shortcomings, the integrated MEC with remote clouds is a promising platform, where edge-clouds (cloudlet) are co-located with wireless access points in the proximity of IoT devices, thus intensive-computation and sensing data from IoT devices can be offloaded to the MEC network for processing, and the service response latency can be significantly reduced. In this paper, we study delay-sensitive service provisioning in an MEC network for IoT applications. We first formulate two novel optimization problems, i.e., the total utility maximization problems under both static and dynamic offloading task request settings, with the aim to maximize the accumulative user satisfaction of using the services provided by the MEC. We then show that the defined problems are NP-hard. We instead devise efficient approximation and online algorithms with provable performance guarantees for the problems. We finally evaluate the performance of the proposed algorithms through experimental simulations. Experimental results demonstrate that the proposed algorithms are promising.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115059278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lightweight Short-term Photovoltaic Power Prediction for Mobile Edge Computing","authors":"Albert Y. Zomaya","doi":"10.1145/3416010.3431218","DOIUrl":"https://doi.org/10.1145/3416010.3431218","url":null,"abstract":"To meet the needs for energy savings in Internet of Things (IoT) and mobile systems, solar energy has been increasingly exploited to serve as a green and renewable source to allow systems to better operate in an energy-efficient way. In this respect, accurate photovoltaics (PV) power output prediction is a prerequisite for any energy saving scheme employed in these systems [1]. In this talk, I am going to discuss a unified training framework combined with the LightGBM algorithm to obtain a prediction model, which can provide short-term predictions of PV power output. Compared with the training in a single powerful machine, our proposed framework is more energy-efficient and fits into devices with limited computation and storage capabilities (e.g. IoT and mobile devices)[2]. The experimental results show that our proposed framework is superior to other benchmark machine learning algorithms.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117283096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trajectory-Assisted Robust RFID-tagged Object Tracking and Recognition in Room Environment","authors":"Motoki Ougida, H. Yamaguchi, T. Higashino","doi":"10.1145/3416010.3423241","DOIUrl":"https://doi.org/10.1145/3416010.3423241","url":null,"abstract":"This paper takes a Computer-Vision (CV) and RFID fusion approach to tracking RFID-tagged objects in a room environment. Unlike similar CV-RFID fusion techniques that fuse two different estimates from CV and RFID systems to increase the certainty of locations, our system does not directly localize RFID tags. Instead, each tag-attached object's usage time by a human is detected by observation of the tag's phase variance. The time is then used to identify the pinpoint locations where the object is handed and released by the human, using the corresponding human trajectory observed by 3D depth cameras. RSSI variance caused by human movement is also leveraged to estimate rough locations of such objects that are not used by humans. Finally, the correspondence between the objects and RFID tags is automatically recognized by clustering the feature vectors of objects. Consequently, once the type of one object, such as pen, book, and cup, the other objects in the cluster can be annotated with the same object type to facilitate object management in the system. The experimental results have shown that object usage is detected with 0.984 accuracy, objects are localized with 58.3cm median error in severe NLoS environment, and ten types of objects are identified with 0.842 accuracy in a laboratory room.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114437646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Revisiting Wi-Fi Performance under the Impact of Corrupted Channel State Information","authors":"Youngwook Son, S. Bahk","doi":"10.1145/3416010.3423223","DOIUrl":"https://doi.org/10.1145/3416010.3423223","url":null,"abstract":"Wi-Fi devices become increasingly susceptible to mutual interference in congested network scenarios. If a device starts to receive a new frame in the presence of concurrent interference signal, its preamble reception can be seriously damaged, which spoils the channel estimation process. The resulting corrupted channel state information (CSI) causes persistent decoding errors throughout the data payload. This paper presents a comprehensive study into the impact of corrupted CSI on Wi-Fi performance. Through experimental study and link-level analysis, we verify that actual receiver performance is highly dependent on CSI acquisition at the preamble, which has never been reflected by any physical layer abstraction models. We develop a realistic model that reflects the impact of corrupted CSI on overall frame reception. Applying our model to ns-3 simulator, we revisit network performance in interference-prone scenarios, to assess consistency with real-world Wi-Fi systems.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Popularity-based Transmission Range Selection for D2D-supported Content Delivery","authors":"L. Pescosolido, A. Passarella, M. Conti","doi":"10.1145/3416010.3423238","DOIUrl":"https://doi.org/10.1145/3416010.3423238","url":null,"abstract":"Considering device-to-device (D2D) wireless links as a virtual extension of 5G (and beyond) cellular networks to deliver popular contents has been proposed as an interesting approach to reduce energy consumption, congestion, and bandwidth usage at the network edge. In the scenario of multiple users in a region independently requesting some popular content, there is a major potential for energy consumption reduction exploiting D2D communications. In this scenario, we consider the problem of selecting the maximum allowed transmission range (or equivalently the maximum transmit power) for the D2D links that support the content delivery process. We show that, for a given maximum allowed D2D energy consumption, a considerable reduction of the cellular infrastructure energy consumption can be achieved by selecting the maximum D2D transmission range as a function of content class parameters such as popularity and delay-tolerance, compared to a uniform selection across different content classes. Specifically, we provide an analytical model that can be used to estimate the energy consumption (for small delay tolerance) and thus to set the optimal transmission range. We validate the model via simulations and study the energy gain that our approach allows to obtain. Our results show that the proposed approach to the maximum D2D transmission range selection allows a reduction of the overall energy consumption in the range of 30% to 55%, compared to a selection of the maximum D2D transmission range oblivious to popularity and delay tolerance.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121526491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Heusse, Takwa Attia, C. Caillouet, F. Rousseau, A. Duda
{"title":"Capacity of a LoRaWAN Cell","authors":"M. Heusse, Takwa Attia, C. Caillouet, F. Rousseau, A. Duda","doi":"10.1145/3416010.3423228","DOIUrl":"https://doi.org/10.1145/3416010.3423228","url":null,"abstract":"In this paper, we consider the problem of evaluating the capacity of a LoRaWAN cell. Previous analytical studies investigated LoRaWAN performance in terms of the Packet Delivery Ratio (PDR) given a number of devices around a gateway and its range. We improve the model for PDR by taking into consideration that the following two events are dependent: successful capture during a collision and successful frame decoding despite ambient noise. We consider a realistic traffic model in which all devices generate packets with the same inter-transmission times corresponding to the duty cycle limitation at the highest SF, regardless of the distance to the gateway. Based on the developed model, we optimize the Spreading Factor (SF) boundaries to even out PDR throughout the cell. We validate the analytical results with simulations, compare our model with previous work, and experimentally validate the hypothesis of Rayleigh fading for the LoRa channel. The important conclusion from our results is that a LoRa cell can handle a relatively large number of devices. We also show that there is practically no inter-SF interference (cross interference between transmissions with different SFs): interference from higher SFs comes from nodes located farther away, so they face greater attenuation and thus, they do not interfere with lower SF nodes.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132640224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Adaptive Traffic-Flow based Controller Deployment Scheme for Software-Defined Vehicular Networks","authors":"Noura Aljeri, A. Boukerche","doi":"10.1145/3416010.3423237","DOIUrl":"https://doi.org/10.1145/3416010.3423237","url":null,"abstract":"Software-Defined Vehicular Networks has been a vital component for heterogeneous radio access technologies to support massive data load through various safety and infotainment applications. Elevating the constraint of static hardware network devices into a programmable unit and providing a global view of the network status and standard interface between heterogeneous radio access technologies. However, having a logically centralized control unit brings several challenges, including bottleneck problem and densification issues. A distributed control plane comes as a possible solution to the centralized control plane yet with several questions of where to deploy the control units and how many SDN controllers are needed in a given network structure. In this paper, we present an adaptive Flow-based controller deployment and assignment strategy for distributed Software-Defined Vehicular Networks through the utilization of the communication latencies between switch-enabled access points and their corresponding vehicles' flow over a time window. We evaluate the proposed method's performance in terms of end-to-end delay and load on the resulted controller's points and their cluster's set. The clustering method is compared to several types of static placement strategies, in which the proposed method showed a reduction in controllers' average delays while distributing the load among them over time.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matteo Mendula, Siavash Khodadadeh, S. S. Bacanli, Sharare Zehtabian, Hassam Sheikh, Ladislau Bölöni, D. Turgut, P. Bellavista
{"title":"Interaction and Behaviour Evaluation for Smart Homes: Data Collection and Analytics in the ScaledHome Project","authors":"Matteo Mendula, Siavash Khodadadeh, S. S. Bacanli, Sharare Zehtabian, Hassam Sheikh, Ladislau Bölöni, D. Turgut, P. Bellavista","doi":"10.1145/3416010.3423227","DOIUrl":"https://doi.org/10.1145/3416010.3423227","url":null,"abstract":"The smart home concept can significantly benefit from predictive models that take proactive management operations on home actuators, based on users' behavior evaluation. In this paper, we use a small-scale physical model, the ScaledHome-2 testbed, to experiment with the evolution of measurements in a suburban home under different environmental scenarios. We start from the observation that, for a home to become smart, in addition to IoT sensors and actuators, we also need a predictive model of how actions taken by inhabitants and home actuators affect the internal environment of the home, reflected in the sensor readings. In this paper, we propose a technique to create such a predictive model through machine learning in various simulated weather scenarios. This paper also contributes to the literature in the field by quantitatively comparing several machine learning algorithms (K-nearest neighbor, regression trees, Support Vector Machine regression, and Long Short Term Memory deep neural networks) in their ability to create accurate and generalizable predictive models for smart homes.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Experimental Study of Rate and Beam Adaptation in 60 GHz WLANs","authors":"Shivang Aggarwal, Urjit Satish Sardesai, Viral Sinha, Dimitrios Koutsonikolas","doi":"10.1145/3416010.3423219","DOIUrl":"https://doi.org/10.1145/3416010.3423219","url":null,"abstract":"In this paper, we conduct an extensive experimental study of the two primary link adaptation mechanisms in 60 GHz WLANs, namely rate adaptation and beam adaptation, using a large data set collected from a 60 GHz software-defined radio testbed. First, we compare the effectiveness of the two mechanisms in a variety of indoor environments and scenarios, including linear and angular displacement, mobility, blockage, and interference. Next, we study the effectiveness of two rate adaptation approaches -- SNR-based rate adaptation, which has been proposed by recent works, and a learning-based approach using PHY layer information. Our results show that the former performs poorly in practical scenarios, while the latter is promising, especially when combined with online training. Finally, we explore the effectiveness of maintaining backup beams to speedup link recovery and reduce the beam training overhead. We show that this heuristic fails in scenarios involving angular displacement on the receiver side but is quite effective in most other scenarios.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116542420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Reinforcement Learning in Slotted Aloha for Ad-Hoc Networks","authors":"Molly Zhang, L. D. Alfaro, J. Garcia-Luna-Aceves","doi":"10.1145/3416010.3423231","DOIUrl":"https://doi.org/10.1145/3416010.3423231","url":null,"abstract":"Slotted ALOHA is known to have poor channel utilization (a maximum of 37% when average offered load is one packet per time slot). Reinforcement learning has recently been proposed as a technique that allows nodes to learn to coordinate their transmissions in order to attain much higher network utilization. All reinforcement learning schemes proposed to date assume immediate feedback on the outcome of a packet transmission. We introduce ALOHA-dQT, a reinforcement-learning protocol that achieves high utilization by having nodes broadcast short summaries of the channel history as known to them along with their packets. Our simulation results show that ALOHA-dQT leads to network utilization above 75%, with fair bandwidth allocation among nodes. ALOHA-dQT is the first reinforcement-learning approach applied to slotted ALOHA suitable for ad-hoc networks without centralized repeaters.","PeriodicalId":177469,"journal":{"name":"Proceedings of the 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}