scholarly journals Multi-Tier Cellular Handover with Multi-Access Edge Computing and Deep Learning

Telecom ◽  
2021 ◽  
Vol 2 (4) ◽  
pp. 446-471
Author(s):  
Percy Kapadia ◽  
Boon-Chong Seet

This paper proposes a potential enhancement of handover for the next-generation multi-tier cellular network, utilizing two fifth-generation (5G) enabling technologies: multi-access edge computing (MEC) and machine learning (ML). MEC and ML techniques are the primary enablers for enhanced mobile broadband (eMBB) and ultra-reliable and low latency communication (URLLC). The subset of ML chosen for this research is deep learning (DL), as it is adept at learning long-term dependencies. A variant of artificial neural networks called a long short-term memory (LSTM) network is used in conjunction with a look-up table (LUT) as part of the proposed solution. Subsequently, edge computing virtualization methods are utilized to reduce handover latency and increase the overall throughput of the network. A realistic simulation of the proposed solution in a multi-tier 5G radio access network (RAN) showed a 40–60% improvement in overall throughput. Although the proposed scheme may increase the number of handovers, it is effective in reducing the handover failure (HOF) and ping-pong rates by 30% and 86%, respectively, compared to the current 3GPP scheme.

2021 ◽  
Vol 27 (2) ◽  
pp. 78-85
Author(s):  
Ivaylo I. Atanasov ◽  
Evelina N. Pencheva

Network programmability and edge computing as key features of next generation communications enable innovative services. While the programmability is focused on the core network of the fifth-generation system, the edge computing moves the network intelligence to the radio access network. This paper presents a study on the programmability of connectivity control as a function of radio access network using Multi-access Edge Computing. The capability of using more than one radio access technology simultaneously enhances reliability and increases the throughput, especially in dense networks. Opening the radio access network interfaces for programmability of multi-connectivity enables analytics applications to control the device connections to multiple radio links simultaneously based on information of radio conditions, user location or specific policies. The research novelty is in opening the radio access network interfaces for edge applications to access connectivity control.


2019 ◽  
Vol 8 (4) ◽  
pp. 51 ◽  
Author(s):  
Federico Tonini ◽  
Bahare Khorsandi ◽  
Elisabetta Amato ◽  
Carla Raffaelli

The global connected cars market is growing rapidly. Novel services will be offered to vehicles, many of them requiring low-latency and high-reliability networking solutions. The Cloud Radio Access Network (C-RAN) paradigm, thanks to the centralization and virtualization of baseband functions, offers numerous advantages in terms of costs and mobile radio performance. C-RAN can be deployed in conjunction with a Multi-access Edge Computing (MEC) infrastructure, bringing services close to vehicles supporting time-critical applications. However, a massive deployment of computational resources at the edge may be costly, especially when reliability requirements demand deployment of redundant resources. In this context, cost optimization based on integer linear programming may result in being too complex when the number of involved nodes is more than a few tens. This paper proposes a scalable approach for C-RAN and MEC computational resource deployment with protection against single-edge node failure. A two-step hybrid model is proposed to alleviate the computational complexity of the integer programming model when edge computing resources are located in physical nodes. Results show the effectiveness of the proposed hybrid strategy in finding optimal or near-optimal solutions with different network sizes and with affordable computational effort.


2021 ◽  
Author(s):  
Mariam Ishtiaq ◽  
Nasir Saeed ◽  
Muhammad Asif Khan

Edge computing is one of the key driving forces to enable Beyond 5G (B5G) and 6G networks. Due to the unprecedented increase in traffic volumes and computation demands of future networks, Multi-access Edge Computing (MEC) is considered as a promising solution to provide cloud-computing capabilities within the radio access network (RAN) closer to the end users. There has been a huge amount of research on MEC and its potential applications; however, very little has been said about the key factors of MEC deployment to meet the diverse demands of future applications. In this article, we present key considerations for edge deployments in B5G/6G networks including edge architecture, server location and capacity, user density, security etc. We further provide state-of-the-art edge-centric services in future B5G/6G networks. Lastly, we present some interesting insights and open research problems in edge computing for 6G networks.


2018 ◽  
Vol 18 (2) ◽  
pp. 133-150 ◽  
Author(s):  
Evelina Pencheva ◽  
Ivaylo Atanasov

Abstract An important ingredient of fifth generation (5G) networks will be Multi-access Edge Computing (MEC). MEC brings the computational intelligence of the cloud within the Radio Access Network (RAN). The virtualized functionality is accessible through Application Programming Interfaces (APIs). In this paper, we study capabilities of reuse existing time-tested Web Services to provide mobile edge middleware services. The focus is on mobile edge services that can be used by applications for bandwidth management and access to user contextual information. An extension of Web Service functionality is proposed. Implementation issues of Web Services in RAN are considered.


2021 ◽  
Author(s):  
Mariam Ishtiaq ◽  
Nasir Saeed ◽  
Muhammad Asif Khan

Edge computing is one of the key driving forces to enable Beyond 5G (B5G) and 6G networks. Due to the unprecedented increase in traffic volumes and computation demands of future networks, Multi-access Edge Computing (MEC) is considered as a promising solution to provide cloud-computing capabilities within the radio access network (RAN) closer to the end users. There has been a huge amount of research on MEC and its potential applications; however, very little has been said about the key factors of MEC deployment to meet the diverse demands of future applications. In this article, we present key considerations for edge deployments in B5G/6G networks including edge architecture, server location and capacity, user density, security etc. We further provide state-of-the-art edge-centric services in future B5G/6G networks. Lastly, we present some interesting insights and open research problems in edge computing for 6G networks.


2021 ◽  
Author(s):  
Xiaolong Wang ◽  
Jianwu Dang ◽  
Shuxu Zhao ◽  
Zhanping Zhang ◽  
Yangping Wang ◽  
...  

Abstract The emergence of multi-access edge computing (MEC) aims at extending cloud computing capabilities to the edge of the radio access network. As the large-scale IoT services are rapidly growing, a single edge infrastructure provider (EIP) may not be sufficient to handle the data traffic generated by these services. The coalition method has been used in MEC for resource optimization, latency, energy consumption reduction, computation offloading, etc. However, the majority of research does not consider the price of computing resources corresponded to a container. Moreover, each SP does not choose EIP with the highest cost-performance to sign a medium/long-term computing resource purchase or lease contract. In this work, we consider a scenario with a collection of SPs with different budgets and several EIPs distributed in geographical locations. During the first phase, we get the market equilibrium price and select the optimal EIPs to make a deal by solving the Eisenberg-Gale convex program. In the second stage, using a mathematical model, we maximize EIP's profits and form stable coalitions between EIPs by a distributed coalition formation algorithm. Numerical results demonstrate that the effectiveness of our method is significantly better than the existing model.


2021 ◽  
Vol 2 (2) ◽  
Author(s):  
Kate Highnam ◽  
Domenic Puzio ◽  
Song Luo ◽  
Nicholas R. Jennings

AbstractBotnets and malware continue to avoid detection by static rule engines when using domain generation algorithms (DGAs) for callouts to unique, dynamically generated web addresses. Common DGA detection techniques fail to reliably detect DGA variants that combine random dictionary words to create domain names that closely mirror legitimate domains. To combat this, we created a novel hybrid neural network, Bilbo the “bagging” model, that analyses domains and scores the likelihood they are generated by such algorithms and therefore are potentially malicious. Bilbo is the first parallel usage of a convolutional neural network (CNN) and a long short-term memory (LSTM) network for DGA detection. Our unique architecture is found to be the most consistent in performance in terms of AUC, $$F_1$$ F 1 score, and accuracy when generalising across different dictionary DGA classification tasks compared to current state-of-the-art deep learning architectures. We validate using reverse-engineered dictionary DGA domains and detail our real-time implementation strategy for scoring real-world network logs within a large enterprise. In 4 h of actual network traffic, the model discovered at least five potential command-and-control networks that commercial vendor tools did not flag.


2022 ◽  
Vol 54 (9) ◽  
pp. 1-37
Author(s):  
Pasika Ranaweera ◽  
Anca Jurcut ◽  
Madhusanka Liyanage

The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of automated driving, augmented-reality, and machine-type-communication are quite sophisticated and require an elevation of the current mobile infrastructure for launching. The fifth-generation (5G) mobile technology serves as the solution, though it lacks a proximate networking infrastructure to satisfy the service guarantees. Multi-access Edge Computing (MEC) envisages such an edge computing platform. In this survey, we are revealing security vulnerabilities of key 5G-based use cases deployed in the MEC context. Probable security flows of each case are specified, while countermeasures are proposed for mitigating them.


2021 ◽  
Author(s):  
Chonghua Xue ◽  
Cody Karjadi ◽  
Ioannis Ch. Paschalidis ◽  
Rhoda Au ◽  
Vijaya B. Kolachalama

AbstractBackgroundIdentification of reliable, affordable and easy-to-use strategies for detection of dementia are sorely needed. Digital technologies, such as individual voice recordings, offer an attractive modality to assess cognition but methods that could automatically analyze such data without any pre-processing are not readily available.MethodsWe used a subset of 1264 digital voice recordings of neuropsychological examinations administered to participants from the Framingham Heart Study (FHS), a community-based longitudinal observational study. The recordings were 73 minutes in duration, on average, and contained at least two speakers (participant and clinician). Of the total voice recordings, 483 were of participants with normal cognition (NC), 451 recordings were of participants with mild cognitive impairment (MCI), and 330 were of participants with dementia. We developed two deep learning models (a two-level long short-term memory (LSTM) network and a convolutional neural network (CNN)), which used the raw audio recordings to classify if the recording included a participant with only NC or only dementia, and also to differentiate between recordings corresponding to non-demented (NC+MCI) and demented participants.FindingsBased on 5-fold cross-validation, the LSTM model achieved a mean (±std) area under the sensitivity-specificity curve (AUC) of 0.744±0.038, mean accuracy of 0.680±0.032, mean sensitivity of 0.719±0.112, and mean specificity of 0.652±0.089 in predicting cases with dementia from those with normal cognition. The CNN model achieved a mean AUC of 0.805±0.027, mean accuracy of 0.740±0.033, mean sensitivity of 0.735±0.094, and mean specificity of 0.750±0.083 in predicting cases with only dementia from those with only NC. For the task related to classification of demented participants from non-demented ones, the LSTM model achieved a mean AUC of 0.659±0.043, mean accuracy of 0.701±0.057, mean sensitivity of 0.245±0.161 and mean specificity of 0.856±0.105. The CNN model achieved a mean AUC of 0.730±0.039, mean accuracy of 0.735±0.046, mean sensitivity of 0.443±0.113, and mean specificity of 0.840±0.076 in predicting cases with dementia from those who were not demented.InterpretationThis proof-of-concept study demonstrates the potential that raw audio recordings of neuropsychological testing performed on individuals recruited within a community cohort setting can provide a level of screening for dementia.


Sign in / Sign up

Export Citation Format

Share Document