Cross-Layer Policy-To-Scheduler Coupling for Context-Aware 6G Networks: Design, Modeling, and Evaluation

Authors

  • Bhaskara Raju Rallabandi

Keywords:

Cross-Layer. Policy-to-Scheduler Coupling. Context-Aware Networks. 6G Communication Systems. Intelligent Resource Management.

Abstract

The very fast development of 6G networks is requiring intelligent, adaptive, and efficient frameworks so that they may abide by increasing complexity of communication environments. This work proposes a novel cross-layer policy-to-scheduler coupling framework for context-aware 6G networks. In other words, the main objective is to provide a mechanism through which the network policies and the scheduling mechanism have seamless interaction, closing the existing gap between different layers of protocols. According to their proposed design, real-time contextual information is gathered from the physical, network, and application layer levels. With this information, decisions are made dynamically with resource optimization and service quality enhancements as the goals. A modeling approach is formulated to be able to describe the interaction between scheduling policies and algorithms so that the system can adapt network decisions concerning changes in user demand, patterns of user mobility, and environment conditions. Utilizing context-awareness inside the system supports giving traffic priorities to different applications, in real-time resource allocation, while assuring ultra-low latency and high reliability. Both analytical and simulation models evaluate the framework to measure the effectiveness in the improvement of throughput, adaptability, and overall network performance. It proved that cross-layer coupling could greatly increase scheduling efficiency and policy enforcement versus the traditional methods using isolated layers. Hence, this work is a basis for intelligent and context-aware resource management in future 6G networks.

Downloads

Download data is not yet available.

References

P. Porambage, G. Gur, D. P. M. Osorio, M. Liyanage, A. Gurtov, and M. Ylianttila, “The Roadmap to 6G Security and Privacy,” IEEE Open Journal of the Communications Society, vol. 2, pp. 1094–1122, 2021.

M. Liyanage et al., “A Survey on Zero Touch Network and Service Management (ZSM) for 5G and Beyond Networks,” Journal of Network and Computer Applications, vol. 203, p. 103362, Jul. 2022.

J. Gallego-Madrid, R. Sanchez-Iborra, P. M. Ruiz, and A. F. Skarmeta, “Machine Learning-Based Zero-Touch Network and Service Management: A Survey,” Digital Communications and Networks, vol. 8, no. 2, pp. 105–123, Apr. 2022.

C. Benzaid and T. Taleb, “AI-Driven Zero Touch Network and Service Management in 5G and Beyond: Challenges and Research Directions,” IEEE Network, vol. 34, no. 2, pp. 186–194, 2020.

5)L. Yang and A. Shami, “IoT Data Analytics in Dynamic Environments: From an Automated Machine Learning Perspective,” Engineering Applications of Artificial Intelligence, vol. 116, pp. 1–33, 2022.

D. M. Manias, I. Shaer, L. Yang, and A. Shami, “Concept Drift Detection in Federated Networked Systems,” Proc. IEEE Global Communications Conference (GLOBECOM), pp. 1–6, 2021.

F. Hutter, L. Kotthoff, and J. Vanschoren, Automated Machine Learning: Methods, Systems, Challenges, Springer, 2019.

N. Kumar Trivedi, A. Kumar, A. Anand, and S. Maheshwari, “Cross-Layer Intrusion Detection in Mobile Ad Hoc Networks – A Survey,” Annals of the Romanian Society for Cell Biology, vol. 25, pp. 9–20, 2021.

L. Yang and A. Shami, “A Lightweight Concept Drift Detection and Adaptation Framework for IoT Data Streams,” IEEE Internet of Things Magazine, vol. 4, no. 2, pp. 96–101, 2021.

A. Singh, J. Amutha, J. Nagar, S. Sharma, and C. C. Lee, “AutoML-ID: Automated Machine Learning Model for Intrusion Detection Using Wireless Sensor Networks,” Scientific Reports, vol. 12, no. 1, pp. 1–14, May 2022.

M. A. Khan, N. Iqbal, H. Jamil, and D. H. Kim, “An Optimized Ensemble Prediction Model Using AutoML Based on Soft Voting Classifier for Network Intrusion Detection,” Journal of Network and Computer Applications, vol. 212, p. 103560, Mar. 2023.

W. Elmasry, A. Akbulut, and A. H. Zaim, “Evolving Deep Learning Architectures for Network Intrusion Detection Using a Double PSO Metaheuristic,” Computer Networks, vol. 168, p. 107042, 2020.

L. Gandhimathi and G. Murugaboopathi, “A Novel Hybrid Intrusion Detection Using Flow-Based Anomaly Detection and Cross-Layer Features in Wireless Sensor Networks,” Automatic Control and Computer Sciences, vol. 54, no. 1, pp. 62–69, 2020.

H. Fang, X. Wang, and L. Hanzo, “Learning-Aided Physical Layer Authentication as an Intelligent Process,” IEEE Transactions on Communications, vol. 67, no. 3, pp. 2260–2273, Mar. 2019.

X. Qiu, J. Dai, and M. Hayes, “A Learning Approach for Physical Layer Authentication Using Adaptive Neural Network,” IEEE Access, vol. 8, pp. 26139–26149, 2020.

H. Fang, X. Wang, and L. Xu, “Fuzzy Learning for Multi-Dimensional Adaptive Physical Layer Authentication: A Compact and Robust Approach,” IEEE Transactions on Wireless Communications, vol. 19, no. 8, pp. 5420–5432, Aug. 2020.

Q. Wang, H. Li, D. Zhao, Z. Chen, S. Ye, and J. Cai, “Deep Neural Networks for CSI-Based Authentication,” IEEE Access, vol. 7, pp. 123026–123034, 2019.

V. L. Nguyen, P. C. Lin, B. C. Cheng, R. H. Hwang, and Y. D. Lin, “Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2384–2428, 2021.

R.-F. Liao et al., “Multiuser Physical Layer Authentication in Internet of Things with Data Augmentation,” IEEE Internet of Things Journal, vol. 7, no. 3, pp. 2077–2088, Mar. 2020.

L. Yang and A. Shami, “Optimized and Automated Machine Learning Techniques Towards IoT Data Analytics and Cybersecurity,” Electronic Thesis and Dissertation Repository, Western University, 2022.

Chauhan et al., “Automated Machine Learning: The New Wave of Machine Learning,” 2nd Int. Conf. Innov. Mech. Ind. Appl. ICIMIA 2020 - Conf. Proc., no. Icimia, pp. 205–212, 2020.

L. Yang and A. Shami, “A Multi-Stage Automated Online Network Data Stream Analytics Framework for IIoT Systems,” IEEE Trans. Ind. Informatics, vol. 19, no. 2, pp. 2107–2116, 2023.

P. Kaur and A. Gosain, “Comparing the Behavior of Oversampling and Undersampling Approach of Class Imbalance Learning by Combining Class Imbalance Problem with Noise,” in ICT Based Innovations, Springer, Singapore, 2018, pp. 23–30.

E. Aminian, R. P. Ribeiro, and J. Gama, “Chebyshev approaches for imbalanced data streams regression models,” Data Min. Knowl. Discov., vol. 35, no. 6, pp. 2389–2466, Nov. 2021.

S. Pande, A. Khamparia, and D. Gupta, “Feature selection and comparison of classification algorithms for wireless sensor networks,” J. Ambient Intell. Humaniz. Comput., 2021.

C. Thornton, F. Hutter, H. H. Hoos, and K. Leyton-Brown, “AutoWEKA: Combined selection and hyperparameter optimization of classification algorithms,” Proc. ACM SIGKDD Int. Conf. Knowl. Discov. Data Min., vol. Part F1288, pp. 847–855, 2013.

A. Bifet and R. Gavalda, “Learning from time-changing data with ` adaptive windowing,” Proc. 7th SIAM Int. Conf. Data Min., pp. 443–448, 2007.

Baena-Garc´ıa, J. del Campo-Avila, R. Fidalgo, A. Bifet, R. Gavald ´ a,` and R. Morales-Bueno, “Early Drift Detection Method,” 4th ECML PKDD Int. Work. Knowl. Discov. from Data Streams, vol. 6, pp. 77–86, 2006.

Lu, A. Liu, F. Dong, F. Gu, J. Gama, and G. Zhang, “Learning under Concept Drift: A Review,” IEEE Trans. Knowl. Data Eng., vol. 31, no. 12, pp. 2346–2363, 2019.

30)M. Gomes et al., “Adaptive random forests for evolving data stream classification,” Mach. Learn., vol. 106, no. 9–10, pp. 1469–1495, 2017.

M. Gomes, J. Read, and A. Bifet, “Streaming random patches for evolving data stream classification,” Proc. - IEEE Int. Conf. Data Mining, ICDM, vol. 2019-Novem, no. Icdm, pp. 240–249, 2019.

Jamieson and A. Talwalkar, “Non-stochastic Best Arm Identification and Hyperparameter Optimization,” in Proceedings of the 19th International Conference on Artificial Intelligence and Statistics, 2016, pp. 240–248.

33)B. R. Rallabandi, “Agentic-AI Orchestration in O-RAN for Policy-Driven Network Automation,” International

Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), vol. 11, no. 7, pp. 224–233, Jul. 2023.

B. R. Rallabandi, “Closed-Loop Automation via Observability in Integrated O-RAN and 5G Systems,” Turkish Journal of Computer and Mathematics Education (TURCOMAT), vol. 14, no. 2, pp. 187–196, Feb. 2023.

B. R. Rallabandi, “Precision Time Synchronization for Mission-Critical Wireless: Delay Bounds, Synchronization Algorithms, and Experimental Validation,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 12,no. 3, pp. 201–210, Jun. 2022.

B. R. Rallabandi, “MEC-Native 5G Systems Orchestration Algorithms for Ultra-Low Latency Cloud-Edge Integration,” International Journal of Intelligent Systems and Applications in Engineering (IJISAE), vol. 10, no. 3, pp. 145–154, Aug. 2020.

Downloads

Published

31.12.2024

How to Cite

Bhaskara Raju Rallabandi. (2024). Cross-Layer Policy-To-Scheduler Coupling for Context-Aware 6G Networks: Design, Modeling, and Evaluation. International Journal of Intelligent Systems and Applications in Engineering, 12(23s), 3768 –. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7890

Issue

Section

Research Article