We gratefully acknowledge support from
the Simons Foundation and member institutions.

Networking and Internet Architecture

New submissions

[ total of 9 entries: 1-9 ]
[ showing up to 2000 entries per page: fewer | more ]

New submissions for Wed, 10 Aug 22

[1]  arXiv:2208.04733 [pdf]
Title: Secure Implementation of a Vehicular Application for the Symbian Platform
Journal-ref: International Journal on Information Technologies & Security 4(2), 2012
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

A vehicular ad-hoc network is a type of communication network where the nodes are vehicles. Their aim is to manage traffic efficiently in order to prevent unwanted events such as accidents, jams, etc. The research on this type of networks assumes the use of additional infrastructure installed on the roads, and special devices installed in vehicles. In this paper we propose a novel solution for the deployment of vehicular networks, which uses only existing smartphones with technologies such as Wi-Fi, GPS and Bluetooth. This approach will save the costs of road infrastructure deployment and extra vehicles devices, making it possible to deploy the first real-world vehicular ad-hoc network with a low cost. In particular, the developed implementation of the proposal for the Symbian platform is here examined in full detail.

[2]  arXiv:2208.04836 [pdf]
Title: Non-Fungible Tokens in Business and Management -- A Review
Comments: This is an author version of our paper submitted to a journal
Subjects: Networking and Internet Architecture (cs.NI); Cryptography and Security (cs.CR)

Non-Fungible Tokens (NFTs) are a new development in blockchain technology. News around NFTs is surrounded by skepticism because unrealistically high prices are being paid online for these NFTs which are in the form of apparently simple digital arts and photographs. It is not clear if this is a trend, a hype, a bubble, or a legitimate novel way of holding and trading value. A literature review of peer-reviewed scholarly studies, performed in the context of business and management, is presented here. Moreover, we also discuss open issues, and challenges, and present future research directions. Analysis of these studies reveal that schools of thoughts are divided on the validity of this form of digital tokens. On one hand, there is a lot of criticism but on the other hand, we can find novel business models and applications of NFTs especially the feature of smart contracts. It can, therefore, be concluded that NFTs, even if not in their current form, are here to stay and may promise new ways of protecting digital assets in an immutable and easily traceable form.

[3]  arXiv:2208.04860 [pdf]
Title: F-802.11P: A Fuzzy Enhancement for ieee 802.11P in Vehicle-TO-Everything Communications
Comments: 22 pages, 17 figures, 4 tables
Journal-ref: International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
Subjects: Networking and Internet Architecture (cs.NI)

Vehicle-to-Everything communications (V2X) are becoming increasingly popular as a solution for safer roads and better traffic management. One of the essential protocols in V2X is the Dedicated Short Range Communication (DSRC) protocol suite. DSRC includes the IEEE 802.11p protocol that operates at the medium access control (MAC) and physical (PHY) layers. Upon collision, the IEEE 802.11p MAC layer applies a carrier sense multiple access/collision avoidance (CSMA/CA) mechanism that randomly selects a backoff time to re-check the channel activity and then retransmit. However, the random selection of the backoff time may lead to further packet collisions that decrease the utilization of the communication channel, which suffers from a limited bandwidth in the first place. This paper proposes a fuzzy model based on rational decision-making, which we call F-802.11p, to improve the IEEE 802.11p protocol backoff time selection by limiting the IEEE 802.11p beacon messages to better use of the available bandwidth. A simulation study presents the evaluation of our work compared to IEEE 802.11p. We deployed the simulation software in two scenarios: the Veins Framework map and the map of New Administrative Cairo in Egypt. We base our comparison on slots backoff, times into backoff, PHY busy time, MAC busy time, total lost packets, and generated/received beacon messages. Simulation results show that both protocols have comparable results in slots backoff, times into back off, and the generated beacon messages. At the same time, our F-802.11p significantly outperforms the IEEE 802.11p in PHY busy time, MAC busy time, total lost packets, and the received beacon messages in both scenarios.

Cross-lists for Wed, 10 Aug 22

[4]  arXiv:2208.02945 (cross-list from eess.SP) [pdf, ps, other]
Title: Continuous Beam Alignment for Mobile MIMO
Comments: Submitted to IEEE
Subjects: Signal Processing (eess.SP); Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)

Millimeter-wave transceivers use large antenna arrays to form narrow high-directional beams and overcome severe attenuation. Narrow beams require large signaling overhead to be aligned if no prior information about beam directions is available. Moreover, beams drift with time due to user mobility and may need to be realigned. Beam tracking is commonly used to keep the beams tightly coupled and eliminate the overhead associated with realignment. Hence, with periodic measurements, beams are adjusted before they lose alignment. We propose a model where the receiver adjusts beam direction "continuously" over each physical-layer sample according to a carefully calculated estimate of the continuous variation of the beams. In our approach, the change of direction is updated using the estimate of the variation rate of beam angles via two different methods, a Continuous-Discrete Kalman filter and an MMSE of a first-order approximation of the variation. Our approach incurs no additional overhead in pilots, yet, the performance of beam tracking is improved significantly. Numerical results reveal an SNR enhancement associated with reducing the MSE of the beam directions. In addition, our approach reduces the pilot overhead by 60% and up to 87% while achieving a similar total tracking duration as the state-of-the-art.

[5]  arXiv:2208.04509 (cross-list from eess.SP) [pdf, other]
Title: Next Generation Reconfigurable MetaSurfaces: When Wave Propagation Control Meets Computing
Subjects: Signal Processing (eess.SP); Networking and Internet Architecture (cs.NI)

The envisioned sixth-generation (6G) of wireless networks will involve an intelligent integration of communications and computing, thereby meeting the urgent demands of diverse applications. To realize the concept of the smart radio environment, reconfigurable intelligent surfaces (RISs) are a promising technology for offering programmable propagation of impinging electromagnetic signals via external control. However, the purely reflective nature of conventional RISs induces significant challenges in supporting computation-based applications, e.g., wave-based calculation and signal processing. To fulfil future communication and computing requirements, new materials are needed to complement the existing technologies of metasurfaces, enabling further diversification of electronics and their applications. In this event, we introduce the concept of reconfigurable intelligent computational surface (RICS), which is composed of two reconfigurable multifunctional layers: the `reconfigurable beamforming layer' which is responsible for tunable signal reflection, absorption, and refraction, and the `intelligence computation layer' that concentrates on metamaterials-based computing. By exploring the recent trends on computational metamaterials, RICSs have the potential to make joint communication and computation a reality. We further demonstrate two typical applications of RICSs for performing wireless spectrum sensing and secrecy signal processing. Future research challenges arising from the design and operation of RICSs are finally highlighted.

[6]  arXiv:2208.04817 (cross-list from cs.DC) [pdf, other]
Title: Exploring GPU Stream-Aware Message Passing using Triggered Operations
Comments: 11 pages, 12 figures
Subjects: Distributed, Parallel, and Cluster Computing (cs.DC); Networking and Internet Architecture (cs.NI)

Modern heterogeneous supercomputing systems are comprised of compute blades that offer CPUs and GPUs. On such systems, it is essential to move data efficiently between these different compute engines across a high-speed network. While current generation scientific applications and systems software stacks are GPU-aware, CPU threads are still required to orchestrate data moving communication operations and inter-process synchronization operations.
A new GPU stream-aware MPI communication strategy called stream-triggered (ST) communication is explored to allow offloading both computation and communication control paths to the GPU. The proposed ST communication strategy is implemented on HPE Slingshot Interconnects over a new proprietary HPE Slingshot NIC (Slingshot 11) using the supported triggered operations feature. Performance of the proposed new communication strategy is evaluated using a microbenchmark kernel called Faces, based on the nearest-neighbor communication pattern in the CORAL-2 Nekbone benchmark, over a heterogeneous node architecture consisting of AMD CPUs and GPUs.

Replacements for Wed, 10 Aug 22

[7]  arXiv:2107.06881 (replaced) [pdf, other]
Title: Evolution of Non-Terrestrial Networks From 5G to 6G: A Survey
Comments: Accepted for publication in IEEE Communications Surveys & Tutorials
Subjects: Networking and Internet Architecture (cs.NI); Emerging Technologies (cs.ET); Signal Processing (eess.SP)
[8]  arXiv:2204.06910 (replaced) [pdf, other]
Title: Measurement-based Admission Control in Sliced Networks: A Best Arm Identification Approach
Subjects: Networking and Internet Architecture (cs.NI); Machine Learning (cs.LG)
[9]  arXiv:2111.12851 (replaced) [pdf, other]
Title: A Tractable Approach to Coverage Analysis in Downlink Satellite Networks
Comments: 15 pages
Subjects: Information Theory (cs.IT); Networking and Internet Architecture (cs.NI)
[ total of 9 entries: 1-9 ]
[ showing up to 2000 entries per page: fewer | more ]

Disable MathJax (What is MathJax?)

Links to: arXiv, form interface, find, cs, recent, 2208, contact, help  (Access key information)