Adlen Ksentini's research while affiliated with EURECOM and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (14)
Future communication networks are envisioned to satisfy increasingly granular and dynamic requirements to accommodate the application and user demands. Indeed, novel immersive and mission-critical services necessitate increased computing and network resources, reduced communication latency, and guaranteed reliability. Thus, efficient and adaptive r...
The virtualization of radio access networks (RANs) is emerging as a key component of future wireless systems, as it brings agility to the RAN architecture and offers degrees of design freedom. In this paper, we investigate and characterize the computational and memory requirements of virtual RANs. To this end, we build a virtual RAN test-bed levera...
Open Radio Access Network (O-RAN) alliance was recently launched to devise a new RAN architecture featuring open, software-driven, virtual, and intelligent radio access architecture. O-RAN architecture is based on (1) disaggregated RAN functions that run as Virtual Network Function (VNF) and Physical Network Function (PNF); (2) the notion of RAN co...
Learning from massive network data to produce cognitive knowledge for efficient resource management in 5G and beyond 5G (B5G) is still challenging. We are delighted to introduce the readers to this special section of the IEEE Transactions on Cognitive Communications and Networking (TCCN), which aims at exploring recent advances and addressing pract...
Information-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today’s Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realiz...
One of the key goals of future 5G networks is to incorporate many different services into a single physical network, where each service has its logical network isolated from other networks. Besides, Network Slicing (NS) is considered as the key technology for meeting the service requirements of diverse application domains. Recently, NS faces severa...
5G networks are anticipated to support a plethora of innovative and promising network services. These services have heterogeneous performance requirements (e.g., high-rate traffic, low latency and high reliability). To meet them, 5G networks are entailed to endorse flexibility that can be fulfilled through the deployment of new emerging technologie...
Identity-as-a-Service (IDaaS) is one of the most famous fruitful authentication services for cloud deployment to Software-as-a-Service (SaaS) model. It is a third party approach for identity management including creation, authentication and privacy assurance. In this work, the Virtual Identity (VID), as a new realization for IDaaS terminology which...
The upcoming 5G ecosystem is envisioned to build business-driven Network Slices to accommodate the different needs of divergent service types, applications and services in support of vertical industries. In this paper, we describe the Network Slicing concept, by unveiling a novel Network Slicing architecture for integrated 5G communications. Furthe...
Knowing the variety of services and applications to be supported in the upcoming 5G systems, the current "one size fits all" network architecture is no more efficient. Indeed, each 5G service may have different needs in terms of latency, bandwidth, and reliability, which cannot be sustained by the same physical network infrastructure. In this conte...
We present the design and implementation of a Content-Delivery-Network-as-a-Service (CDNaaS) architecture, which allows a telecom operator to open up its cloud infrastructure for content providers to deploy virtual CDN instances on demand, at regions where the operator has presence. Using northbound REST APIs, content providers can express performa...
Citations
... This framework integrates workload prediction and resource pre-provisioning to provide high utilization of edge resources. Pramanik et al. characterize the computational and memory requirements of virtual RANs with regression models to predict better demands for resources [6]. They use 4G vRAN test-bed leveraging the non-disaggregated open-source mobile communication platform and general-purpose processor-based servers. ...
... The mode selection is determined by the method, which is based on the immediate reward provided by the surroundings. In the paper [18], the authors discuss the deep learning-based work that has been proposed to improve the 5G RAN portion of the network, as well as how these works can be integrated with the AI-enabled Open-RAN architecture. ...
... The primary goal of 5th Generation networks is to combine multiple services into a single infrastructure, each with its own logical network [7]. The 5th Generation of mobile networks is the next step in the evolution of mobile networks and is regarded as the digital world's future.5th ...
... • Artificial intelligence (AI) jobs, which usually have a large number of concurrent tasks. Examples include smart home applications [42,82], smart healthcare [46], anomaly detection [81], object recognition [37], autonomous driving services [8], and intelligent photo management [68]. In particular, machine learning jobs that are submitted in TensorFlow [1] framework are a representative type of AI jobs. ...
... IoV uses Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) for communication [3]. The interactive information mainly includes road congestion, moving tracks, traffic accidents and entertainment consultation to create a safe and comfortable driving environment [4]. In order to prevent criminals from eavesdropping on and tampering with information, which may endanger the traffic system, information interaction must ensure the integrity and security of data, otherwise the system is vulnerable to malicious attacks, including replay, camouflage, message tampering attacks, etc. [5]. ...
... The main aspect of open-source-MEC is the service-oriented MEC layer (Brik et al., 2020), which contains a uniform south-bound functionality interface and varied network functions, with the south-bound functionality interface connecting different network functions jointly based on the uniform stateless hypertext transmission protocol (HTTP) to ensure that they may interact directly with one another if needed. The work also presented the detached centralized service functionalities into distinct (Huang et al., 2017(Huang et al., , 2022aLv et al., 2018). After that, to improve open-source MEC, the work grabbed numerous more network functions from the 5G core network control plane and constructed several new network functions. ...
... The idea of network slicing may be seen as an alternative to network sharing since it creates an end-to-end logical network that utilizes shared infrastructure. According to the network slicing idea, RAN, transport, and CN resources for the network provider are virtualized, and all these resources may subsequently be dynamically or permanently given to various MNOs (Ksentini and Nikaein, 2017;Afolabi et al., 2018). ...
... Therefore, the HBA-NS approach will be a suitable method for network slice placement instead of OCNS and MILP (Papagianni et al., 2018) when resizing network slices periodically to cope with the dynamic nature of the network. Given that UE requests are predicted for each network slice at 10-min intervals in the proposed CNN-LSTM architecture and assuming the startup time for a VNF instance that is hosted in a container is equal to 1 second approximately (Frangoudis et al., 2017), HBA-NS provides the capability to manage network slices in real-time and scaling them dynamically during each prediction interval as HBA-NS completes the network slicing process before the time interval (10 minutes) expires. Fig. 16 illustrates the overall cost of network slice deployment for each approach. ...
... Existing studies on the allocation of computing and communication resources to different network slices in 5G networks can be broadly classified based on their architectures as either one-tier schemes [15][16][17][18][19], two-tier schemes [20][21][22][23][24], as well as Graph-based deep learning and reinforcement learning schemes [25][26][27][28][29]. The related studies are reviewed in the following sub-sections. ...