MAC Protocol Design Optimization Using Deep Learning

02/06/2020
by   Hannaneh B Pasandi, et al.
0

Deep learning (DL)-based solutions have recently been developed for communication protocol design. Such learning-based solutions can avoid manual efforts to tune individual protocol parameters. While these solutions look promising, they are hard to interpret due to the black-box nature of the ML techniques. To this end, we propose a novel DRL-based framework to systematically design and evaluate networking protocols. While other proposed ML-based methods mainly focus on tuning individual protocol parameters (e.g., adjusting contention window), our main contribution is to decouple a protocol into a set of parametric modules, each representing a main protocol functionality and is used as DRL input to better understand the generated protocols design optimization and analyze them in a systematic fashion. As a case study, we introduce and evaluate DeepMAC a framework in which a MAC protocol is decoupled into a set of blocks across popular flavors of 802.11 WLANs (e.g., 802.11a/b/g/n/ac). We are interested to see what blocks are selected by DeepMAC across different networking scenarios and whether DeepMAC is able to adapt to network dynamics.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/02/2020

Towards A Learning-Based Framework for Self-Driving Design of Networking Protocols

Networking protocols are designed through long-time and hard-work human ...
research
02/06/2020

Unboxing MAC Protocol Design Optimization Using Deep Learning

Evolving amendments of 802.11 standards feature a large set of physical ...
research
07/23/2020

On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems

IoT security and privacy has raised grave concerns. Efforts have been ma...
research
07/17/2009

Graph Theory and Optimization Problems for Very Large Networks

Graph theory provides a primary tool for analyzing and designing compute...
research
11/12/2020

Machine Learning Interpretability Meets TLS Fingerprinting

Protecting users' privacy over the Internet is of great importance. Howe...
research
08/24/2023

Multivariate Time Series Anomaly Detection: Fancy Algorithms and Flawed Evaluation Methodology

Multivariate Time Series (MVTS) anomaly detection is a long-standing and...
research
01/18/2018

A Formalization for Specifying and Implementing Correct Pull-Stream Modules

Pull-stream is a JavaScript demand-driven functional design pattern base...

Please sign up or login with your details

Forgot password? Click here to reset