IEEE Open Journal of the Communications Society最新文献

筛选
英文 中文
Cell-Free Massive MIMO With Multiple Active Eavesdroppers
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534640
Yasseen Sadoon Atiya;Zahra Mobini;Hien Quoc Ngo;Michail Matthaiou
{"title":"Cell-Free Massive MIMO With Multiple Active Eavesdroppers","authors":"Yasseen Sadoon Atiya;Zahra Mobini;Hien Quoc Ngo;Michail Matthaiou","doi":"10.1109/OJCOMS.2025.3534640","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534640","url":null,"abstract":"This paper investigates the secrecy performance of cell-free massive MIMO (CF-mMIMO) systems in the presence of active spoofing attacks by multiple eavesdroppers (Eves). Each Eve conducts a spoofing attack on a different legitimate user during the uplink training phase, aiming to intercept the information intended for that user during the downlink transmission phase. To counter these attacks, we propose a joint access point (AP) selection and power optimization strategy to enhance the security performance of the CF-mMIMO system. Specifically, we formulate an optimization problem that seeks to maximize the sum-spectral efficiency (SE) of the legitimate users while ensuring a positive secrecy spectral efficiency (SSE) for all the attacked users. A sub-optimal solution to this mixed-integer non-convex problem is obtained using an efficient, low-complexity accelerated projected gradient (APG)-based algorithm. Moreover, for system design purposes, we introduce two simple and efficient methods: <italic>i)</i> detecting the presence of multiple active Eves within the system and identifying which users are under attack, and <italic>ii)</i> estimating the large-scale fading coefficients between the APs and the Eves. Our findings show that the proposed approach achieves a median sum-SE performance that is 62% better than that of equal power allocation without AP selection scheme. Furthermore, the results demonstrate that the proposed strategy significantly improves the sum-SE while ensuring a positive secrecy rate, thereby safeguarding the confidentiality of all transmitted information signals to all users, even in the presence of a relatively large number of Eves.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1859-1872"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10854516","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143675998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-Based Security Architecture for Uncrewed Aerial Systems in B5G/6G Services and Beyond: A Comprehensive Approach
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3528220
Senthil Kumar Jagatheesaperumal;Mohamed Rahouti;Abdellah Chehri;Kaiqi Xiong;Jan Bieniek
{"title":"Blockchain-Based Security Architecture for Uncrewed Aerial Systems in B5G/6G Services and Beyond: A Comprehensive Approach","authors":"Senthil Kumar Jagatheesaperumal;Mohamed Rahouti;Abdellah Chehri;Kaiqi Xiong;Jan Bieniek","doi":"10.1109/OJCOMS.2025.3528220","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3528220","url":null,"abstract":"Uncrewed aerial systems (UASs) were popularly used by hobbyists in the past, but they have now become critical enablers for managing disasters, handling emergencies, and so on. For example, one of their most critical applications is to provide seamless wireless communication services in remote rural areas. Thus, it is substantial to identify and consider the different security challenges in the research and development associated with advanced UAS-based B5G/6G architectures. Catering to this requirement, this article conducts a comprehensive review of the security aspects of UASs with respect to the 5G/6G system architecture, its enabling technologies, and privacy issues. It exhibits security integration at all the protocol stack layers and analyzes the existing mechanisms to secure UAS-based B5G/6G communications and its energy and power optimization factors. Last, this article also summarizes modern technological trends for establishing security and protecting UAS-based systems, along with the open challenges and strategies for future research work.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1042-1069"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10855475","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143430479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing 6G: Survey for Explainable AI on Communications and Network Slicing
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534626
Haochen Sun;Yifan Liu;Ahmed Al-Tahmeesschi;Avishek Nag;Mohadeseh Soleimanpour;Berk Canberk;Hüseyin Arslan;Hamed Ahmadi
{"title":"Advancing 6G: Survey for Explainable AI on Communications and Network Slicing","authors":"Haochen Sun;Yifan Liu;Ahmed Al-Tahmeesschi;Avishek Nag;Mohadeseh Soleimanpour;Berk Canberk;Hüseyin Arslan;Hamed Ahmadi","doi":"10.1109/OJCOMS.2025.3534626","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534626","url":null,"abstract":"The unprecedented advancement of Artificial Intelligence (AI) has positioned Explainable AI (XAI) as a critical enabler in addressing the complexities of next-generation wireless communications. With the evolution of the 6G networks, characterized by ultra-low latency, massive data rates, and intricate network structures, the need for transparency, interpretability, and fairness in AI-driven decision-making has become more urgent than ever. This survey provides a comprehensive review of the current state and future potential of XAI in communications, with a focus on network slicing, a fundamental technology for resource management in 6G. By systematically categorizing XAI methodologies–ranging from modelagnostic to model-specific approaches, and from pre-model to post-model strategies–this paper identifies their unique advantages, limitations, and applications in wireless communications. Moreover, the survey emphasizes the role of XAI in network slicing for vehicular network, highlighting its ability to enhance transparency and reliability in scenarios requiring real-time decision-making and high-stakes operational environments. Real-world use cases are examined to illustrate how XAI-driven systems can improve resource allocation, facilitate fault diagnosis, and meet regulatory requirements for ethical AI deployment. By addressing the inherent challenges of applying XAI in complex, dynamic networks, this survey offers critical insights into the convergence of XAI and 6G technologies. Future research directions, including scalability, real-time applicability, and interdisciplinary integration, are discussed, establishing a foundation for advancing transparent and trustworthy AI in 6G communications systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1372-1412"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10854503","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143496439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental Demonstration of Wireless Transmission Using Airy Beams in Sub-THz Band
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-27 DOI: 10.1109/OJCOMS.2025.3534788
Doohwan Lee;Yasunori Yagi;Kosuke Suzuoki;Riichi Kudo
{"title":"Experimental Demonstration of Wireless Transmission Using Airy Beams in Sub-THz Band","authors":"Doohwan Lee;Yasunori Yagi;Kosuke Suzuoki;Riichi Kudo","doi":"10.1109/OJCOMS.2025.3534788","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3534788","url":null,"abstract":"The use of sub-THz bands makes it possible to take advantage of physical properties of electromagnetic waves that have not been actively exploited to date. Shortened radio wavelengths in sub-THz bands and large-diameter antennas extend the near-field range to hundreds of meters and enable more precise beam manipulation using electromagnetic near-field phenomena. In this work, we investigated the Airy beam, whose main lobe power distribution follows a curved trajectory along its propagation. We first explain the main physical properties of the Airy beam, which include the curved trajectory of the main lobe power distribution, asymmetric sidelobe distribution, and self-healing. Then, we perform experimental verifications to confirm such physical properties. Specifically, we experimentally demonstrate a method to control the curved trajectories, which has not been explicitly demonstrated using sub-THz bands in the literature so far. In addition, we experimentally perform the transmission of four different streams using four Airy beams, taking advantage of the fact that low-interference transmission of multiple streams is possible thanks to the asymmetric sidelobe distribution properties of Airy beams. Our findings show that the total transmission rate exceeds 400 Gb/s, indicating that Airy beams can be utilized for high-capacity wireless transmission in sub-THz bands. Finally, we experimentally validate the self-healing property of the Airy beam through wireless transmission over a wireless link that is partially blocked by an obstacle. This provides new use cases for sub-THz bands, such as obstacle avoidance. Our theoretical and experimental research on Airy beams will leverage the diverse physical properties of electromagnetic waves to provide expanded and versatile uses in wireless communications.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1091-1102"},"PeriodicalIF":6.3,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10855494","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143430478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spectral Efficiency and Hybrid Beamforming for Multi-User in Airborne Integrated Sensing and Communication Systems
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-23 DOI: 10.1109/OJCOMS.2025.3533358
Abdalla Salih;Suhail Al-Dharrab
{"title":"Spectral Efficiency and Hybrid Beamforming for Multi-User in Airborne Integrated Sensing and Communication Systems","authors":"Abdalla Salih;Suhail Al-Dharrab","doi":"10.1109/OJCOMS.2025.3533358","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3533358","url":null,"abstract":"Autonomous aerial vehicles (AAVs) are expected to play a significant role in future Integrated Sensing and Communication (ISAC) systems. However, the performance of multi-user communications in airborne ISAC systems relies significantly on the AAV position and flight trajectory, and accurate radio propagation channel model for the scene/environment among other factors. In this paper, we propose a low-complexity AAV-enabled ISAC system model and investigate the spectral efficiency and information-outage probability. Our model employs a hybrid beamforming (HBF) design, where both the AAV and users have multiple antenna arrays which enables multi-user communications with the AAV along with the AAV’s sensing capabilities of targets of interest. We propose a large-scale path loss model taking into consideration the realistic scatterers, deflection, and reflections in the scene. We investigate and analyze the average spectral efficiency for various scenarios, observe the optimal AAV altitude, and consider sensing and user interference while studying the system parameters.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1190-1201"},"PeriodicalIF":6.3,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10851318","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent NOMA-Based Wireless Backhauling for IoT Applications Without End-Device CSI
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-23 DOI: 10.1109/OJCOMS.2025.3532998
Ashfaq Ahmed;Arafat Al-Dweik;Youssef Iraqi;Hamad Yahya;Ernesto Damiani
{"title":"Intelligent NOMA-Based Wireless Backhauling for IoT Applications Without End-Device CSI","authors":"Ashfaq Ahmed;Arafat Al-Dweik;Youssef Iraqi;Hamad Yahya;Ernesto Damiani","doi":"10.1109/OJCOMS.2025.3532998","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3532998","url":null,"abstract":"The article introduces an innovative wireless backhauling approach employing non-orthogonal multiple access (NOMA) and automatic repeat request (ARQ) mechanisms. In this novel scheme, power allocation follows a round-robin (RR) method, ensuring equitable performance among paired users. To address the potential packet loss after ARQ, an intelligent packet repair technique is incorporated to recover the dropped packets. A key feature involves storing dropped data packets for subsequent processing before forwarding them to their respective IoT devices (IoDs). The proposed methodology hinges on recognizing that interference within a dropped packet may correspond to a packet retrievable in a forthcoming transmission, facilitating recovery through iterative successive interference cancellation (SIC). Significantly, the scheme enhances data reliability without necessitating an increase in the ARQ retransmission limit, which makes it particularly suited for certain Internet of things (IoT) applications. Empirical results confirm a substantial success rate in recovering dropped packets. Notably, the iterative interference cancellation (IIC) technique demonstrated a noteworthy reduction in the packet drop rate (PDR) from <inline-formula> <tex-math>$10^{-1}$ </tex-math></inline-formula> to <inline-formula> <tex-math>$10^{-3}$ </tex-math></inline-formula>, representing a 100-fold improvement, which implies the successful recovery of 99% of the packets initially dropped in specific scenarios, showcasing the efficacy of the proposed approach.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1070-1090"},"PeriodicalIF":6.3,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10851350","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143430533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Link Scheduling in Satellite Networks via Machine Learning Over Riemannian Manifolds
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-23 DOI: 10.1109/OJCOMS.2025.3533296
Joarder Jafor Sadique;Imtiaz Nasim;Ahmed S. Ibrahim
{"title":"Link Scheduling in Satellite Networks via Machine Learning Over Riemannian Manifolds","authors":"Joarder Jafor Sadique;Imtiaz Nasim;Ahmed S. Ibrahim","doi":"10.1109/OJCOMS.2025.3533296","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3533296","url":null,"abstract":"Low Earth Orbit (LEO) satellites play a crucial role in enhancing global connectivity, serving a complementary solution to existing terrestrial systems. In wireless networks, scheduling is a vital process that allocates time-frequency resources to users for interference management. However, LEO satellite networks face significant challenges in scheduling their links towards ground users due to the satellites’ mobility and overlapping coverage. This paper addresses the dynamic link scheduling problem in LEO satellite networks by considering spatio-temporal correlations introduced by the satellites’ movements. The first step in the proposed solution involves modeling the network over Riemannian manifolds, thanks to their representation as symmetric positive definite matrices. We introduce two machine learning (ML)-based link scheduling techniques that model the dynamic evolution of satellite positions and link conditions over time and space. To accurately predict satellite link states, we present a recurrent neural network (RNN) over Riemannian manifolds, which captures spatio-temporal characteristics over time. Furthermore, we introduce a separate model, the convolutional neural network (CNN) over Riemannian manifolds, which captures geometric relationships between satellites and users by extracting spatial features from the network topology across all links. Simulation results demonstrate that both RNN and CNN over Riemannian manifolds deliver comparable performance to the fractional programming-based link scheduling (FPLinQ) benchmark. Remarkably, unlike other ML-based models that require extensive training data, both models only need 30 training samples to achieve over 99% of the sum rate while maintaining similar computational complexity relative to the benchmark.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"972-985"},"PeriodicalIF":6.3,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10851312","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143361077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Distributed Computation Offloading and Radio Resource Slicing Based on Reinforcement Learning in Vehicular Networks
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-23 DOI: 10.1109/OJCOMS.2025.3533093
Khaled A. Alaghbari;Heng-Siong Lim;Charilaos C. Zarakovitis;N. M. Abdul Latiff;Sharifah Hafizah Syed Ariffin;Su Fong Chien
{"title":"Joint Distributed Computation Offloading and Radio Resource Slicing Based on Reinforcement Learning in Vehicular Networks","authors":"Khaled A. Alaghbari;Heng-Siong Lim;Charilaos C. Zarakovitis;N. M. Abdul Latiff;Sharifah Hafizah Syed Ariffin;Su Fong Chien","doi":"10.1109/OJCOMS.2025.3533093","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3533093","url":null,"abstract":"Computation offloading in Internet of Vehicles (IoV) networks is a promising technology for transferring computation-intensive and latency-sensitive tasks to mobile-edge computing (MEC) or cloud servers. Privacy is an important concern in vehicular networks, as centralized system can compromise it by sharing raw data from MEC servers with cloud servers. A distributed system offers a more attractive solution, allowing each MEC server to process data locally and make offloading decisions without sharing sensitive information. However, without a mechanism to control its load, the cloud server’s computation capacity can become overloaded. In this study, we propose distributed computation offloading systems using reinforcement learning, such as Q-learning, to optimize offloading decisions and balance computation load across the network while minimizing the number of task offloading switches. We introduce both fixed and adaptive low-complexity mechanisms to allocate resources of the cloud server, formulating the reward function of the Q-learning method to achieve efficient offloading decisions. The proposed adaptive approach enables cooperative utilization of cloud resources by multiple agents. A joint optimization framework is established to maximize overall communication and computing resource utilization, where task offloading is performed on a small-time scale at local edge servers, while radio resource slicing is adjusted on a larger time scale at the cloud server. Simulation results using real vehicle tracing datasets demonstrate the effectiveness of the proposed distributed systems in achieving lower computation load costs, offloading switching costs, and reduce latency while increasing cloud server utilization compared to centralized systems.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1231-1245"},"PeriodicalIF":6.3,"publicationDate":"2025-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10851385","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-20 DOI: 10.1109/OJCOMS.2025.3531318
Alireza Famili;Shihua Sun;Tolga Atalay;Angelos Stavrou
{"title":"Harnessing Meta-Reinforcement Learning for Enhanced Tracking in Geofencing Systems","authors":"Alireza Famili;Shihua Sun;Tolga Atalay;Angelos Stavrou","doi":"10.1109/OJCOMS.2025.3531318","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3531318","url":null,"abstract":"Geofencing technologies have become pivotal in creating virtual boundaries for both real and virtual environments, offering a secure means to control and monitor designated areas. They are now considered essential tools for defining and controlling boundaries across various applications, from aviation safety in drone management to access control within mixed reality platforms like the metaverse. Effective geofencing relies heavily on precise tracking capabilities, a critical component for maintaining the integrity and functionality of these systems. Leveraging the advantages of 5G technology, including its large bandwidth and extensive accessibility, presents a promising solution to enhance geofencing performance. In this paper, we introduce MetaFence: Meta-Reinforcement Learning for Geofencing Enhancement, a novel approach for precise geofencing utilizing indoor 5G small cells, termed “5G Points”, which are optimally deployed using a meta-reinforcement learning (meta-RL) framework. Our proposed meta-RL method addresses the NP-hard problem of determining an optimal placement of 5G Points to minimize spatial geometry-induced errors. Moreover, the meta-training approach enables the learned policy to quickly adapt to diverse new environments. We devised a comprehensive test campaign to evaluate the performance of MetaFence. Our results demonstrate that this strategic placement significantly improves tracking accuracy compared to traditional methods. Furthermore, we show that the meta-training strategy enables the learned policy to generalize effectively and perform efficiently when faced with new environments.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"944-960"},"PeriodicalIF":6.3,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10845873","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143361063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PathKatana: Accurate Available Bandwidth Estimation for High-Speed Networks Using Packet Train Consisting Only of Large-Sized Packets
IF 6.3
IEEE Open Journal of the Communications Society Pub Date : 2025-01-17 DOI: 10.1109/OJCOMS.2025.3529211
Jingcheng Huang;Naoyuki Ito;Takashi Oshiba;Kozo Satoda;Tutomu Murase
{"title":"PathKatana: Accurate Available Bandwidth Estimation for High-Speed Networks Using Packet Train Consisting Only of Large-Sized Packets","authors":"Jingcheng Huang;Naoyuki Ito;Takashi Oshiba;Kozo Satoda;Tutomu Murase","doi":"10.1109/OJCOMS.2025.3529211","DOIUrl":"https://doi.org/10.1109/OJCOMS.2025.3529211","url":null,"abstract":"This paper proposes PathKatana, a method for accurately and stably estimating the available bandwidth of high-speed networks using packet train consisting of large-sized packets close to the MTU (Maximum Transmission Unit). Active end-to-end available bandwidth estimation is often intrusive, costly, and inaccurate. However, it is extremely important for designing high-performance network systems, improving network protocols, building distributed systems, and enhancing application performance. PathKatana follows the principle of PathRefiner estimation and calculates estimated values by transmitting and receiving packets near the size of MTU, using a modified theoretical curve. By calculating the absolute delay based on the transmission and reception data of reference packets and fitting it with the modified PathQuick3 theoretical curve, PathKatana estimates the available bandwidth. When implemented on an actual device and evaluated on a 1 Gbps high-speed line, PathKatana demonstrated superior estimation accuracy compared to conventional methods. It was confirmed that PathKatana can estimate the available bandwidth of high-speed lines with high accuracy.","PeriodicalId":33803,"journal":{"name":"IEEE Open Journal of the Communications Society","volume":"6 ","pages":"1838-1846"},"PeriodicalIF":6.3,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10845085","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143675997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信