Inter-Network Load Balancing Based on Hash Access

被引:0
作者
Xie, Hui [1 ]
Ling, Xin-Tong [1 ,2 ,3 ]
Wang, Zi-Han [4 ]
Wang, Jia-Heng [1 ,2 ,3 ]
机构
[1] National Mobile Communications Research Laboratory, Southeast University, Jiangsu, Nanjing
[2] Purple Mountain Laboratories, Jiangsu, Nanjing
[3] Frontiers Science Center for Mobile Information Communication and Security, Southeasat University, Jiangsu, Nanjing
[4] University of California Los Angeles, Los Angeles, 90095, CA
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2024年 / 52卷 / 07期
基金
中国国家自然科学基金;
关键词
access control; Hash Access; network load balancing; radio access network;
D O I
10.12263/DZXB.20230063
中图分类号
学科分类号
摘要
The intricacy of wireless access networks continues to escalate, accompanied by a substantial proliferation in the number of wireless devices. In order to augment network capability and resource utilization, it is necessary to design effective access control and resource allocation schemes to balance traffic loads among subnetworks and promote cross-domain resource coordination and sharing. To address this, our paper builds upon the recently proposed Hash Access protocol and devises an optimization method, which dynamically adjusts access parameters based on the network load to alleviate network congestion. Furthermore, this paper presents traffic balancing and resource re-allocation schemes for multi-subnetwork scenarios, offering valuable approaches for integrating wireless resources and offloading traffics. Simulation results demonstrate that the proposed Hash Access optimization method maximizes network throughput while ensuring network stability, and the proposed resource allocation scheme effectively addresses load unbalancing issue, thereby enhancing the performance and fairness for complex integrated networks. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:2201 / 2211
页数:10
相关论文
共 50 条
[31]   A Novel Load Balancing Algorithm based on Binary Particle Swarm Optimization for Heterogeneous Integrated Networks [J].
Zeng Ying ;
Jiang Kang-ming ;
Chen Yuan-yuan ;
Tang Liang-rui .
2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, :476-480
[32]   A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity [J].
Shilova, A. D. ;
Vorob'eva, A. A. .
AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) :1116-1125
[33]   Network Function Placement in Virtualized Radio Access Network with Reinforcement Learning Based on Graph Neural Network [J].
Yi, Mengting ;
Lin, Mugang ;
Chen, Wenhui .
ELECTRONICS, 2025, 14 (08)
[34]   A Method of Network Access Control for Ensuring Network Infrastructure Security Based on Severing Superfluous Network Connectivity [J].
A. D. Shilova ;
A. A. Vorob’eva .
Automatic Control and Computer Sciences, 2023, 57 :1116-1125
[35]   Address Localization Method Based on Data Fusion of Core Network and Radio Access Network [J].
Wang, Tianyi ;
Han, Yuhui ;
Zhang, Wei ;
Cheng, Xinzhou ;
Gao, Jie ;
Zhang, Qingqing ;
Yang, Qijiao ;
Chen, Fengqiang ;
Cheng, Chen .
2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, :2263-2268
[36]   Analyzing of multi service backhaul network based on IP radio access network technology [J].
Chen, Haitao ;
Liang, Youcheng .
2016 IEEE INTERNATIONAL CONFERENCE OF ONLINE ANALYSIS AND COMPUTING SCIENCE (ICOACS), 2016, :189-192
[37]   Application Level Network Access Control System Based on TNC Architecture for Enterprise Network [J].
Chen, Zhen ;
Deng, Fa-Chao ;
Luo, An-An ;
Jiang, Xin ;
Li, Guo-Dong ;
Zhang, Run-hua ;
Lin, Chuang .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :667-671
[38]   Network Access Control Mechanism based on Locator/Identifier Split [J].
Tu Rui ;
Su Jinshu ;
Chen Feng .
NAS: 2009 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE, 2009, :171-174
[39]   Blockchain-Based Social Network Access Control Mechanism [J].
Dai, Minjun ;
Li, Yongsheng ;
Wen, Yong ;
Liu, Dongyu ;
Chen, Honglin .
BLOCKCHAIN AND TRUSTWORTHY SYSTEMS, BLOCKSYS 2022, 2022, 1679 :147-164
[40]   Access Control for hybrid Femtocell Network based on AGV Mechanism [J].
Li, Chengmei ;
Duan, Hexiang ;
Ba, Hongbo ;
Zhang, Xiaoning ;
Wu, Jianjun .
2014 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2014, :1055-1058