Networking and Internet Architecture

2025-06-17 | | Total: 17

#1 Delay-optimal Congestion-aware Routing and Computation Offloading in Arbitrary Network [PDF] [Copy] [Kimi] [REL]

Authors: Jinkun Zhang, Yuezhou Liu, Edmund Yeh

Emerging edge computing paradigms enable heterogeneous devices to collaborate on complex computation applications. However, for arbitrary heterogeneous edge networks, delay-optimal forwarding and computation offloading remains an open problem. In this paper, we jointly optimize data/result routing and computation placement in arbitrary networks with heterogeneous node capabilities, and congestion-dependent nonlinear transmission and processing delay. Despite the non-convexity of the formulated problem, based on analyzing the KKT condition, we provide a set of sufficient optimality conditions that solve the problem globally. To provide the insights for such global optimality, we show that the proposed non-convex problem is geodesic-convex with mild assumptions. We also show that the proposed sufficient optimality condition leads to a lower hemicontinuous solution set, providing stability against user-input perturbation. We then extend the framework to incorporate utility-based congestion control and fairness. A fully distributed algorithm is developed to converge to the global optimum. Numerical results demonstrate significant improvements over multiple baselines algorithms.

Subject: Networking and Internet Architecture

Publish: 2025-06-16 15:54:05 UTC


#2 Joint Optimization of Multi-UAV Deployment and 3D Positioning in Traffic-Aware Aerial Networks [PDF] [Copy] [Kimi] [REL]

Authors: Kamran Shafafi, Alaa Awad Abdellatif, Manuel Ricardo, Rui Campos

Unmanned Aerial Vehicles (UAVs) have emerged as a key enabler for next-generation wireless networks due to their on-demand deployment, high mobility, and ability to provide Line-of-Sight (LoS) connectivity. These features make UAVs particularly well-suited for dynamic and mission-critical applications such as intelligent transportation systems and emergency communications. However, effectively positioning multiple UAVs in real-time to meet non-uniform, time-varying traffic demands remains a significant challenge, especially when aiming to optimize network throughput and resource utilization. In this paper, we propose an Efficient Multi-UAV Traffic-Aware Deployment (EMTAD) Algorithm, a scalable and adaptive framework that dynamically adjusts UAV placements based on real-time user locations and spatial traffic distribution. In contrast to existing methods, EMTAD jointly optimizes UAV positioning and minimizes the number of deployed UAVs, ensuring efficient UE-UAV association while satisfying the traffic demand of users. Simulation results demonstrate that EMTAD significantly improves network performance while reducing deployment overhead by minimizing the number of UAVs required in dynamic and traffic-aware environments.

Subjects: Networking and Internet Architecture , Signal Processing

Publish: 2025-06-16 09:29:53 UTC


#3 Dynamic Preference Multi-Objective Reinforcement Learning for Internet Network Management [PDF] [Copy] [Kimi] [REL]

Authors: DongNyeong Heo, Daniela Noemi Rim, Heeyoul Choi

An internet network service provider manages its network with multiple objectives, such as high quality of service (QoS) and minimum computing resource usage. To achieve these objectives, a reinforcement learning-based (RL) algorithm has been proposed to train its network management agent. Usually, their algorithms optimize their agents with respect to a single static reward formulation consisting of multiple objectives with fixed importance factors, which we call preferences. However, in practice, the preference could vary according to network status, external concerns and so on. For example, when a server shuts down and it can cause other servers' traffic overloads leading to additional shutdowns, it is plausible to reduce the preference of QoS while increasing the preference of minimum computing resource usages. In this paper, we propose new RL-based network management agents that can select actions based on both states and preferences. With our proposed approach, we expect a single agent to generalize on various states and preferences. Furthermore, we propose a numerical method that can estimate the distribution of preference that is advantageous for unbiased training. Our experiment results show that the RL agents trained based on our proposed approach significantly generalize better with various preferences than the previous RL approaches, which assume static preference during training. Moreover, we demonstrate several analyses that show the advantages of our numerical estimation method.

Subjects: Networking and Internet Architecture , Machine Learning

Publish: 2025-06-16 07:03:58 UTC


#4 Cost-Efficient Design for 5G-Enabled MEC Servers under Uncertain User Demands [PDF] [Copy] [Kimi] [REL]

Authors: Yunyi Wu, Yongbing Zhang

Mobile edge computing (MEC) enhances the performance of 5G networks by enabling low-latency, high-speed services through deploying data units of the base station on edge servers located near mobile users. However, determining the optimal capacity of these servers while dynamically offloading tasks and allocating computing resources to meet uncertain user demands presents significant challenges. This paper focuses on the design and planning of edge servers with the dual objectives of minimizing capacity requirements and reducing service latency for 5G services. To handle the complexity of uncertain user demands, we formulate the problem as a two-stage stochastic model, which can be linearized into a mixed-integer linear programming (MILP) problem. We propose a novel approach called accelerated Benders decomposition (ABD) to solve the problem at a large network scale. Numerical experiments demonstrate that ABD achieves the optimal solution of MILP while significantly reducing computation time.

Subject: Networking and Internet Architecture

Publish: 2025-06-16 00:09:16 UTC


#5 Learning Best Paths in Quantum Networks [PDF] [Copy] [Kimi] [REL]

Authors: Xuchuang Wang, Maoli Liu, Xutong Liu, Zhuohua Li, Mohammad Hajiesmaili, John C. S. Lui, Don Towsley

Quantum networks (QNs) transmit delicate quantum information across noisy quantum channels. Crucial applications, like quantum key distribution (QKD) and distributed quantum computation (DQC), rely on efficient quantum information transmission. Learning the best path between a pair of end nodes in a QN is key to enhancing such applications. This paper addresses learning the best path in a QN in the online learning setting. We explore two types of feedback: "link-level" and "path-level". Link-level feedback pertains to QNs with advanced quantum switches that enable link-level benchmarking. Path-level feedback, on the other hand, is associated with basic quantum switches that permit only path-level benchmarking. We introduce two online learning algorithms, BeQuP-Link and BeQuP-Path, to identify the best path using link-level and path-level feedback, respectively. To learn the best path, BeQuP-Link benchmarks the critical links dynamically, while BeQuP-Path relies on a subroutine, transferring path-level observations to estimate link-level parameters in a batch manner. We analyze the quantum resource complexity of these algorithms and demonstrate that both can efficiently and, with high probability, determine the best path. Finally, we perform NetSquid-based simulations and validate that both algorithms accurately and efficiently identify the best path.

Subjects: Networking and Internet Architecture , Machine Learning , Quantum Physics

Publish: 2025-06-14 12:01:16 UTC


#6 NR Cell Identity-based Handover Decision-making Algorithm for High-speed Scenario within Dual Connectivity [PDF] [Copy] [Kimi] [REL]

Authors: Zhiyi Zhu, Eiji Takimoto, Patrick Finnertyn, Junjun Zheng, Shoma Suzuki, Chikara Ohta

The dense deployment of 5G heterogeneous networks (HetNets) has improved network capacity. However, it also brings frequent and unnecessary handover challenges to high-speed mobile user equipment (UE), resulting in unstable communication and degraded quality of service. Traditional handovers ignore the type of target next-generation Node B (gNB), resulting in high-speed UEs being able to be handed over to any gNB. This paper proposes a NR cell identity (NCI)-based handover decision-making algorithm (HDMA) to address this issue. The proposed HDMA identifies the type of the target gNB (macro/small/mmWave gNB) using the gNB identity (ID) within the NCI to improve the handover decision-making strategy. The proposed HDMA aims to improve the communication stability of high-speed mobile UE by enabling high-speed UEs to identify the target gNB type during the HDMA using the gNB ID. Simulation results show that the proposed HDMA outperforms other HDMAs in enhanced connection stability.

Subjects: Networking and Internet Architecture , Performance

Publish: 2025-06-14 11:59:42 UTC


#7 Surfing the SWAVES: Lifecycle-aware Service Placement in MEC [PDF] [Copy] [Kimi] [REL]

Authors: Federico Giarrè, Holger Karl

In Multi-access Edge Computing (MEC) networks, users covered by a mobile network can exploit edge clouds (ECs), computational resources located at the network's edge, to execute virtual network functions (VNFs). ECs are particularly useful when deploying VNFs with strict delay and availability requirements. As users roam in the network and get handed over between cells, deployed VNFs must follow users to retain the benefits of edge computing. Yet, having VNFs ready at the closest EC can be challenging: (i) ECs are not usually powerful enough to store and run any combination of VNFs simultaneously; (ii) if a VNF is not available at the needed EC, a series of time-consuming operations has to be performed before the VNF becomes operational. These limitations can be addressed by proactively starting VNFs instances at (likely) future locations, balancing better latency properties against higher resource usage. Such proactive deployment does need forecasting of user movements, but these will be imperfect, creating yet another tradeoff. We present our approach to this service provisioning problem, SWAVES. When compared on the ratio of users' unsuccessful packets, SWAVES improves such metric by orders of magnitude with respect to other proposed heuristic.

Subject: Networking and Internet Architecture

Publish: 2025-06-13 22:31:58 UTC


#8 Real-Time Capable, Low-latency Upstream Scheduling in Multi-Tenant, SLA Compliant TWDM PON [PDF] [Copy] [Kimi] [REL]

Authors: Arijeet Ganguli, Marco Ruffini

Virtualized Passive Optical Networks (vPONs) offer a promising solution for modern access networks, bringing enhanced flexibility, reduced capital expenditures (CapEx), and support for multi-tenancy. By decoupling network functions from physical infrastructure, vPONs enable service providers to efficiently share network resources among multiple tenants. In this paper, we propose a novel merging DBA algorithm, called the Dynamic Time and Wavelength Allocation (DTWA) algorithm, for a virtualized DBA (vDBA) architecture in multi-tenant PON environments. The Algorithm, which enables the merging of multiple virtual DBAs into a physical bandwidth map, introduces multi-channel support, allowing each Optical Network Unit (ONU) to dynamically change, taking into consideration different switching times, transmission wavelength. Leveraging the Numba APIs for high-performance optimization, the algorithm achieves real-time performance with minimal additional latency, meeting the stringent requirements of SLA-compliant, latency-critical 6G applications and services. Our analysis highlights an important trade-off in terms of throughput in multi-tenant conditions, between single-channel vs. multi-channel PONs, as a function of ONUs tuning time. We also compare the performance of our algorithm for different traffic distributions. Finally, in order to assess the time computing penalty of dynamic wavelength optimisation in the merging DBA algorithm, we compare it against a baseline Static Wavelength Allocation (SWA) algorithm, where ONUs are designated a fixed wavelength for transmission.

Subject: Networking and Internet Architecture

Publish: 2025-06-13 17:56:21 UTC


#9 Latency Optimization for Wireless Federated Learning in Multihop Networks [PDF] [Copy] [Kimi] [REL]

Authors: Shaba Shaon, Van-Dinh Nguyen, Dinh C. Nguyen

In this paper, we study a novel latency minimization problem in wireless federated learning (FL) across multi-hop networks. The system comprises multiple routes, each integrating leaf and relay nodes for FL model training. We explore a personalized learning and adaptive aggregation-aware FL (PAFL) framework that effectively addresses data heterogeneity across participating nodes by harmonizing individual and collective learning objectives. We formulate an optimization problem aimed at minimizing system latency through the joint optimization of leaf and relay nodes, as well as relay routing indicator. We also incorporate an additional energy harvesting scheme for the relay nodes to help with their relay tasks. This formulation presents a computationally demanding challenge, and thus we develop a simple yet efficient algorithm based on block coordinate descent and successive convex approximation (SCA) techniques. Simulation results illustrate the efficacy of our proposed joint optimization approach for leaf and relay nodes with relay routing indicator. We observe significant latency savings in the wireless multi-hop PAFL system, with reductions of up to 69.37% compared to schemes optimizing only one node type, traditional greedy algorithm, and scheme without relay routing indicator.

Subjects: Networking and Internet Architecture , Artificial Intelligence , Information Theory

Publish: 2025-06-08 19:10:09 UTC


#10 Mobile Traffic Prediction using LLMs with Efficient In-context Demonstration Selection [PDF] [Copy] [Kimi] [REL]

Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci

Mobile traffic prediction is an important enabler for optimizing resource allocation and improving energy efficiency in mobile wireless networks. Building on the advanced contextual understanding and generative capabilities of large language models (LLMs), this work introduces a context-aware wireless traffic prediction framework powered by LLMs. To further enhance prediction accuracy, we leverage in-context learning (ICL) and develop a novel two-step demonstration selection strategy, optimizing the performance of LLM-based predictions. The initial step involves selecting ICL demonstrations using the effectiveness rule, followed by a second step that determines whether the chosen demonstrations should be utilized, based on the informativeness rule. We also provide an analytical framework for both informativeness and effectiveness rules. The effectiveness of the proposed framework is demonstrated with a real-world fifth-generation (5G) dataset with different application scenarios. According to the numerical results, the proposed framework shows lower mean squared error and higher R2-Scores compared to the zero-shot prediction method and other demonstration selection methods, such as constant ICL demonstration selection and distance-only-based ICL demonstration selection.

Subject: Networking and Internet Architecture

Publish: 2025-06-05 17:08:27 UTC


#11 Multi-domain anomaly detection in a 5G network [PDF] [Copy] [Kimi] [REL]

Authors: Thomas Hoger, Philippe Owezarski

With the advent of 5G, mobile networks are becoming more dynamic and will therefore present a wider attack surface. To secure these new systems, we propose a multi-domain anomaly detection method that is distinguished by the study of traffic correlation on three dimensions: temporal by analyzing message sequences, semantic by abstracting the parameters these messages contain, and topological by linking them in the form of a graph. Unlike traditional approaches, which are limited to considering these domains independently, our method studies their correlations to obtain a global, coherent and explainable view of anomalies.

Subjects: Networking and Internet Architecture , Cryptography and Security

Publish: 2025-06-04 07:40:08 UTC


#12 Unlearning-Enhanced Website Fingerprinting Attack: Against Backdoor Poisoning in Anonymous Networks [PDF] [Copy] [Kimi] [REL]

Authors: Yali Yuan, Kai Xu, Ruolin Ma, Yuchen Zhang

Website Fingerprinting (WF) is an effective tool for regulating and governing the dark web. However, its performance can be significantly degraded by backdoor poisoning attacks in practical deployments. This paper aims to address the problem of hidden backdoor poisoning attacks faced by Website Fingerprinting attack, and designs a feasible mothed that integrates unlearning technology to realize detection of automatic poisoned points and complete removal of its destructive effects, requiring only a small number of known poisoned test points. Taking Tor onion routing as an example, our method evaluates the influence value of each training sample on these known poisoned test points as the basis for judgment. We optimize the use of influence scores to identify poisoned samples within the training dataset. Furthermore, by quantifying the difference between the contribution of model parameters on the taining data and the clean data, the target parameters are dynamically adjusted to eliminate the impact of the backdoor attacks. Experiments on public datasets under the assumptions of closed-world (CW) and open-world (OW) verify the effectiveness of the proposed method. In complex scenes containing both clean website fingerprinting features and backdoor triggers, the accuracy of the model on the poisoned dataset and the test dataset is stable at about 80%, significantly outperforming the traditional WF attack models. In addition, the proposed method achieves a 2-3 times speedup in runtime efficiency compared to baseline methods. By incorporating machine unlearning, we realize a WF attack model that exhibits enhanced resistance to backdoor poisoning and faster execution speeds in adversarial settings.

Subjects: Cryptography and Security , Networking and Internet Architecture

Publish: 2025-06-16 14:48:41 UTC


#13 The User Perspective on Island-Ready 6G Communication: A Survey of Future Smartphone Usage in Crisis-Struck Areas with Local Cellular Connectivity [PDF] [Copy] [Kimi] [REL]

Authors: Leon Janzen, Florentin Putz, Marc-André Kaufhold, Kolja Straub, Matthias Hollick

Using smartphone apps during crises is well-established, proving critical for efficient crisis response. However, such apps become futile without an Internet connection, which is a common issue during crises. The ongoing 6G standardization explores the capability to provide local cellular connectivity for areas cut off from the Internet in crises. This paper introduces to the HCI community the concept of cellular island connectivity in isolated areas, promising a seamless transition from normal operation to island operation with local-only cellular connectivity. It presents findings from a survey (N = 857) among adult smartphone users from major German cities regarding their smartphone usage preferences in this model. Results show a shift in app demand, with users favoring general-purpose apps over dedicated crisis apps in specific scenarios. We prioritize smartphone services based on their criticality, distinguishing between apps essential for crisis response and those supporting routines. Our findings provide operators, developers, and authorities insights into making user-centric design decisions for implementing island-ready 6G communication.

Subjects: Human-Computer Interaction , Networking and Internet Architecture

Publish: 2025-06-16 13:26:37 UTC


#14 HELENA: High-Efficiency Learning-based channel Estimation using dual Neural Attention [PDF] [Copy] [Kimi] [REL]

Authors: Miguel Camelo Botero, Esra Aycan Beyazit, Nina Slamnik-Kriještorac, Johann M. Marquez-Barja

Accurate channel estimation is critical for high-performance Orthogonal Frequency-Division Multiplexing systems such as 5G New Radio, particularly under low signal-to-noise ratio and stringent latency constraints. This letter presents HELENA, a compact deep learning model that combines a lightweight convolutional backbone with two efficient attention mechanisms: patch-wise multi-head self-attention for capturing global dependencies and a squeeze-and-excitation block for local feature refinement. Compared to CEViT, a state-of-the-art vision transformer-based estimator, HELENA reduces inference time by 45.0\% (0.175\,ms vs.\ 0.318\,ms), achieves comparable accuracy ($-16.78$\,dB vs.\ $-17.30$\,dB), and requires $8\times$ fewer parameters (0.11M vs.\ 0.88M), demonstrating its suitability for low-latency, real-time deployment.

Subjects: Signal Processing , Machine Learning , Networking and Internet Architecture

Publish: 2025-06-16 12:21:27 UTC


#15 Building Automotive Security on Internet Standards: An Integration of DNSSEC, DANE, and DANCE to Authenticate and Authorize In-Car Services [PDF] [Copy] [Kimi] [REL]

Authors: Timo Salomon, Mehmet Mueller, Philipp Meyer, Thomas C. Schmidt

The automotive industry is undergoing a software-as-a-service transformation that enables software-defined functions and post-sale updates via cloud and vehicle-to-everything communication. Connectivity in cars introduces significant security challenges, as remote attacks on vehicles have become increasingly prevalent. Current automotive designs call for security solutions that address the entire lifetime of a vehicle. In this paper, we propose to authenticate and authorize in-vehicle services by integrating DNSSEC, DANE, and DANCE with automotive middleware. Our approach decouples the cryptographic authentication of the service from that of the service deployment with the help of DNSSEC and thereby largely simplifies key management. We propose to authenticate in-vehicle services by certificates that are solely generated by the service suppliers but published on deployment via DNSSEC TLSA records solely signed by the OEM. Building on well-established Internet standards ensures interoperability with various current and future protocols, scalable management of credentials for millions of connected vehicles at well-established security levels. We back our design proposal by a security analysis using the STRIDE threat model and by evaluations in a realistic in-vehicle setup that demonstrate its effectiveness.

Subjects: Cryptography and Security , Networking and Internet Architecture

Publish: 2025-06-16 09:02:32 UTC


#16 OSI Stack Redesign for Quantum Networks: Requirements, Technologies, Challenges, and Future Directions [PDF] [Copy] [Kimi] [REL]

Authors: Shakil Ahmed, Muhammad Kamran Saeed, Ashfaq Khokhar

Quantum communication is poised to become a foundational element of next-generation networking, offering transformative capabilities in security, entanglement-based connectivity, and computational offloading. However, the classical OSI model-designed for deterministic and error-tolerant systems-cannot support quantum-specific phenomena such as coherence fragility, probabilistic entanglement, and the no-cloning theorem. This paper provides a comprehensive survey and proposes an architectural redesign of the OSI model for quantum networks in the context of 7G. We introduce a Quantum-Converged OSI stack by extending the classical model with Layer 0 (Quantum Substrate) and Layer 8 (Cognitive Intent), supporting entanglement, teleportation, and semantic orchestration via LLMs and QML. Each layer is redefined to incorporate quantum mechanisms such as enhanced MAC protocols, fidelity-aware routing, and twin-based applications. This survey consolidates over 150 research works from IEEE, ACM, MDPI, arXiv, and Web of Science (2018-2025), classifying them by OSI layer, enabling technologies such as QKD, QEC, PQC, and RIS, and use cases such as satellite QKD, UAV swarms, and quantum IoT. A taxonomy of cross-layer enablers-such as hybrid quantum-classical control, metadata-driven orchestration, and blockchain-integrated quantum trust-is provided, along with simulation tools including NetSquid, QuNetSim, and QuISP. We present several domain-specific applications, including quantum healthcare telemetry, entangled vehicular networks, and satellite mesh overlays. An evaluation framework is proposed based on entropy throughput, coherence latency, and entanglement fidelity. Key future directions include programmable quantum stacks, digital twins, and AI-defined QNet agents, laying the groundwork for a scalable, intelligent, and quantum-compliant OSI framework for 7G and beyond.

Subjects: Quantum Physics , Cryptography and Security , Information Theory , Machine Learning , Networking and Internet Architecture

Publish: 2025-06-13 19:48:18 UTC


#17 C2PO: Coherent Co-packaged Optics using offset-QAM-16 for Beyond PAM-4 Optical I/O [PDF] [Copy] [Kimi] [REL]

Authors: Dan Sturm, Marzieyh Rezaei, Alana Dee, Sajjad Moazeni

Co-packaged optics (CPO) has emerged as a promising solution for achieving the ultra-high bandwidths, shoreline densities, and energy efficiencies required by future GPUs and network switches for AI. Microring modulators (MRMs) are well suited for transmitters due to their compact size, high energy efficiency, and natural compatibility with dense wavelength-division multiplexing (DWDM). However, extending beyond the recently demonstrated 200 Gb/s will require more advanced modulation formats, such as higher-order coherent modulation (e.g., QAM-16). In this work, we show how microring resonators (MRMs) can be efficiently used to implement phase-constant amplitude modulators and form the building blocks of a transmitter for offset QAM-16, which has been shown to simplify carrier-phase recovery relative to conventional QAM. We simulate and evaluate the performance of our proposed MRM-based coherent CPO (C2PO) transmitters using a foundry-provided commercial silicon photonics process, demonstrating an input-normalized electric field amplitude contrast of 0.64 per dimension. Through full link-level bit error rate modeling, we show that our design achieves 400 Gb/s using offset QAM-16 at a total optical laser power of 9.65 dBm-comparable to that required by conventional QAM-16 MZI-based links, despite using 10-100x less area. We further conduct a thermal simulation to assess the transmitter's thermal stability at the MRM input optical power required to meet a target BER at the desired data rates. Finally, as a proof of concept, we demonstrate 25 Gb/s MRM-based offset QAM-4 modulation with a chip fabricated in the GlobalFoundries 45 nm monolithic silicon photonics process.

Subjects: Systems and Control , Networking and Internet Architecture , Applied Physics

Publish: 2025-06-13 18:25:24 UTC