Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a l...Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latency-sensitive service.To this end,we build a tandem model considering the connection relationship between the various components in Sat5G network architecture,and give an end-to-end latency calculation function based on this model.By introducing stochastic network calculus,we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics of multimedia.Numerical results demonstrate the impact of different burst states and different service rates on this relationship,which means the higher the burst of arrival traffic and the higher the average rate of arrival traffic,the greater the probability of end-to-end latency violation.The results will provide valuable guidelines for the traffic control and cache management in Sat5G network.展开更多
Performance evaluation plays a crucial role in the design of network systems. Many theoretical tools, including queueing theory, effective bandwidth and network calculus, have been proposed to provide modeling mechani...Performance evaluation plays a crucial role in the design of network systems. Many theoretical tools, including queueing theory, effective bandwidth and network calculus, have been proposed to provide modeling mechanisms and resuits. While these theories have been widely adopted for performance evaluation, each has its own limitation. With that network systems have become more complex and harder to describe, where a lot of uncertainty and randomness exists, to make performance evaluation of such systems tractable, some compromise is often necessary and helpful. Stochas- tic network calculus (SNC) is such a theoretical tool. While SNC is a relatively new theory, it is gaining increasing interest and popularity. In the current SNC literature, much attention has been paid on the development of the theory itself. In addition, researchers have also started applying SNC to performance analysis of various types of systems in recent years. The aim of this paper is to provide a tutorial on the new theoretical tool. Specifically, various SNC traffic models and SNC server models are reviewed. The focus is on how to apply SNC, for which, four critical steps are formalized and discussed. In addition, a list of SNC application topics/areas, where there may exist huge research potential, is presented.展开更多
Mobile edge computing(MEC) networks can provide a variety of services for different applications. End-to-end performance analysis of these services serves as a benchmark for the efficient planning of network resource ...Mobile edge computing(MEC) networks can provide a variety of services for different applications. End-to-end performance analysis of these services serves as a benchmark for the efficient planning of network resource allocation and routing strategies. In this paper, a performance analysis framework is proposed for the end-to-end data-flows in MEC networks based on stochastic network calculus(SNC). Due to the random nature of routing in MEC networks, probability parameters are introduced in the proposed analysis model to characterize this randomness into the derived expressions. Taking actual communication scenarios into consideration, the end-to-end performance of three network data-flows is analyzed, namely, voice over Internet protocol(VoIP), video, and file transfer protocol(FTP). These network data-flows adopt the preemptive priority scheduling scheme. Based on the arrival processes of these three data-flows, the effect of interference on their performances and the service capacity of each node in the MEC networks, closed-form expressions are derived for showing the relationship between delay, backlog upper bounds, and violation probability of the data-flows. Analytical and simulation results show that delay and backlog performances of the data-flows are influenced by the number of hops in the network and the random probability parameters of interference-flow(IF).展开更多
In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the sp...In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the spectrum. In other words, the primary users have higher priority over the secondary users. In this paper, backlog and delay distribution bounds for both primary users and secondary users are obtained. The analysis is based on stochastic network calculus, for which, stochastic service curves are t-n-st derived for both primary users and secondary users, and the network calculus independent case analysis approach is used to find the distribution bounds. Numerical results and simulation results are also presented and discussed.展开更多
An Long Term Evolution (LTE) network based mobile Internet of Things (IoT) is modeled and analyzed with the probabilistic delay distribution as the main interest. Stochastic network calculus is relied on to conduct th...An Long Term Evolution (LTE) network based mobile Internet of Things (IoT) is modeled and analyzed with the probabilistic delay distribution as the main interest. Stochastic network calculus is relied on to conduct the analysis. Two typical traffic models, i.e., Compound Poisson and Aggregated ON-OFF Source, are analyzed. The wireless fading channel is modeled as a Gilbert-Elliot channel. Numerical results are presented, where the probabilistic delay distribution and guaranteed capacity under certain delay constraint are shown and discussed.展开更多
In response to the requirements for large-scale device access and ultra-reliable and low-latency communication in the power internet of things,unmanned aerial vehicle-assisted multi-access edge computing can be used t...In response to the requirements for large-scale device access and ultra-reliable and low-latency communication in the power internet of things,unmanned aerial vehicle-assisted multi-access edge computing can be used to realize flexible access to power services and update large amounts of information in a timely manner.By considering factors such as machine communication traffic,MAC competition access,and information freshness,this paper develops a cross-layer computing framework in which the peak Age of Information(Ao I)provides a statistical delay boundary in the finite blocklength regime.We also propose a deep machine learning-based multi-access edge computing offloading algorithm.First,a traffic arrival model is established in which the time interval follows the Beta distribution,and then a business service model is proposed based on the carrier sense multiple access with collision avoidance algorithm.The peak Ao I boundary performance of multiple access is evaluated according to stochastic network calculus theory.Finally,an unmanned aerial vehicle-assisted multilevel offloading model with cache is designed,in which the peak Ao I violation probability and energy consumption provide the optimization goals.The optimal offloading strategy is obtained using deep reinforcement learning.Compared with baseline schemes based on non-cooperative game theory with stochastic learning automata and random edge unloading,the proposed algorithm improves the overall performance by approximately 3.52%and 20.73%,respectively,and provides superior deterministic offloading performance by using the peak Ao I boundary.展开更多
基金This work was supported by the National Natural Science Foundation of China under Grants 61801073,61722105,61931004the Natural Science Foundation of Liaoning Province under Grant 20170540034.
文摘Simultaneous use of heterogeneous radio access technologies to increase the performance of real-time,reliability and capacity is an inherent feature of satellite-5G integrated network(Sat5G).However,there is still a lack of theoretical characterization of whether the network can satisfy the end-to-end transmission performance for latency-sensitive service.To this end,we build a tandem model considering the connection relationship between the various components in Sat5G network architecture,and give an end-to-end latency calculation function based on this model.By introducing stochastic network calculus,we derive the relationship between the end-to-end latency bound and the violation probability considering the traffic characteristics of multimedia.Numerical results demonstrate the impact of different burst states and different service rates on this relationship,which means the higher the burst of arrival traffic and the higher the average rate of arrival traffic,the greater the probability of end-to-end latency violation.The results will provide valuable guidelines for the traffic control and cache management in Sat5G network.
基金The authors gratefully acknowledge the anonymous reviewers for their constructive comments. This work was supported in part by the National Basic Research Program of China (973) (Grant Nos. 2010CB328105, 2011CB302703), the National Natural Science Foundation of China (Grant Nos. 60932003, 61071065, 61020106002).
文摘Performance evaluation plays a crucial role in the design of network systems. Many theoretical tools, including queueing theory, effective bandwidth and network calculus, have been proposed to provide modeling mechanisms and resuits. While these theories have been widely adopted for performance evaluation, each has its own limitation. With that network systems have become more complex and harder to describe, where a lot of uncertainty and randomness exists, to make performance evaluation of such systems tractable, some compromise is often necessary and helpful. Stochas- tic network calculus (SNC) is such a theoretical tool. While SNC is a relatively new theory, it is gaining increasing interest and popularity. In the current SNC literature, much attention has been paid on the development of the theory itself. In addition, researchers have also started applying SNC to performance analysis of various types of systems in recent years. The aim of this paper is to provide a tutorial on the new theoretical tool. Specifically, various SNC traffic models and SNC server models are reviewed. The focus is on how to apply SNC, for which, four critical steps are formalized and discussed. In addition, a list of SNC application topics/areas, where there may exist huge research potential, is presented.
基金supported by Natural Science Foundation of China (61871237, 92067101)Program to Cultivate Middleaged and Young Science Leaders of Universities of Jiangsu Province and Key R&D Plan of Jiangsu Province (BE2021013-3)the Youth Foundation of Nanjing Institute of Industry Technology (YK18 - 02012)。
文摘Mobile edge computing(MEC) networks can provide a variety of services for different applications. End-to-end performance analysis of these services serves as a benchmark for the efficient planning of network resource allocation and routing strategies. In this paper, a performance analysis framework is proposed for the end-to-end data-flows in MEC networks based on stochastic network calculus(SNC). Due to the random nature of routing in MEC networks, probability parameters are introduced in the proposed analysis model to characterize this randomness into the derived expressions. Taking actual communication scenarios into consideration, the end-to-end performance of three network data-flows is analyzed, namely, voice over Internet protocol(VoIP), video, and file transfer protocol(FTP). These network data-flows adopt the preemptive priority scheduling scheme. Based on the arrival processes of these three data-flows, the effect of interference on their performances and the service capacity of each node in the MEC networks, closed-form expressions are derived for showing the relationship between delay, backlog upper bounds, and violation probability of the data-flows. Analytical and simulation results show that delay and backlog performances of the data-flows are influenced by the number of hops in the network and the random probability parameters of interference-flow(IF).
文摘In a cognitive radio network, the secondary users can use the spectrum holes when the primary users do not utilize the spectrum, but they must vacant the spectrum when the primary users need to transmit data on the spectrum. In other words, the primary users have higher priority over the secondary users. In this paper, backlog and delay distribution bounds for both primary users and secondary users are obtained. The analysis is based on stochastic network calculus, for which, stochastic service curves are t-n-st derived for both primary users and secondary users, and the network calculus independent case analysis approach is used to find the distribution bounds. Numerical results and simulation results are also presented and discussed.
基金supported by Beijing University of Posts and Telecommunications (BUPT) Fund for Young Scholars under Grant No.2011RC0114
文摘An Long Term Evolution (LTE) network based mobile Internet of Things (IoT) is modeled and analyzed with the probabilistic delay distribution as the main interest. Stochastic network calculus is relied on to conduct the analysis. Two typical traffic models, i.e., Compound Poisson and Aggregated ON-OFF Source, are analyzed. The wireless fading channel is modeled as a Gilbert-Elliot channel. Numerical results are presented, where the probabilistic delay distribution and guaranteed capacity under certain delay constraint are shown and discussed.
基金supported in part by the National Natural Science Foundation of China(Nos.61601182)in part by the Fundamental Research Funds for the Central Universities under Grant 2023MS113。
文摘In response to the requirements for large-scale device access and ultra-reliable and low-latency communication in the power internet of things,unmanned aerial vehicle-assisted multi-access edge computing can be used to realize flexible access to power services and update large amounts of information in a timely manner.By considering factors such as machine communication traffic,MAC competition access,and information freshness,this paper develops a cross-layer computing framework in which the peak Age of Information(Ao I)provides a statistical delay boundary in the finite blocklength regime.We also propose a deep machine learning-based multi-access edge computing offloading algorithm.First,a traffic arrival model is established in which the time interval follows the Beta distribution,and then a business service model is proposed based on the carrier sense multiple access with collision avoidance algorithm.The peak Ao I boundary performance of multiple access is evaluated according to stochastic network calculus theory.Finally,an unmanned aerial vehicle-assisted multilevel offloading model with cache is designed,in which the peak Ao I violation probability and energy consumption provide the optimization goals.The optimal offloading strategy is obtained using deep reinforcement learning.Compared with baseline schemes based on non-cooperative game theory with stochastic learning automata and random edge unloading,the proposed algorithm improves the overall performance by approximately 3.52%and 20.73%,respectively,and provides superior deterministic offloading performance by using the peak Ao I boundary.