Özgü Alay’s research while affiliated with University of Oslo and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (41)


Cross Network Layer Cognitive Service Orchestration in Edge Computing Systems
  • Conference Paper

July 2024

·

4 Reads

Milad Rafiee

·

Amir Taherkordi

·

Özgü Alay


Figure 2: Mean and standard deviation of the participants' satisfaction score (Q1) versus asynchrony, grouped per difficulty level (blue: easy, red: hard). Background point represent the actual answers by each participant.
Figure 3: Mean and standard deviation of the participants' noticeability scores (Q2) versus asynchrony, grouped per difficulty level (blue: easy, red: hard). Background point represent the actual answers by each participant.
Figure 4: Mean and standard deviation of the participants' asynchrony strength scores (Q3) versus delay value, grouped per difficulty level. Background point represent the actual answers by each participant.
Figure 5: Simple Linear Regression results. A figure (and a regression fit) is provided for each question and dissected per difficulty scenario. The confidence levels for each fit are illustrated in grey.
How do Users Experience Asynchrony between Visual and Haptic Information?
  • Conference Paper
  • Full-text available

April 2024

·

20 Reads

Download

Experimentation in 5G and beyond Networks: State of the Art and the Way Forward

December 2023

·

97 Reads

·

3 Citations

Sensors

After first being standardized by the 3rd Generation Partnership Project (3GPP) in Release 15, 5th Generation (5G) mobile systems have been rapidly deployed worldwide [...]



Positioning by Multicell Fingerprinting in Urban NB-IoT Networks

April 2023

·

107 Reads

·

7 Citations

Sensors

Narrowband Internet of Things (NB-IoT) has quickly become a leading technology in the deployment of IoT systems and services, owing to its appealing features in terms of coverage and energy efficiency, as well as compatibility with existing mobile networks. Increasingly, IoT services and applications require location information to be paired with data collected by devices; NB-IoT still lacks, however, reliable positioning methods. Time-based techniques inherited from long-term evolution (LTE) are not yet widely available in existing networks and are expected to perform poorly on NB-IoT signals due to their narrow bandwidth. This investigation proposes a set of strategies for NB-IoT positioning based on fingerprinting that use coverage and radio information from multiple cells. The proposed strategies were evaluated on two large-scale datasets made available under an open-source license that include experimental data from multiple NB-IoT operators in two large cities: Oslo, Norway, and Rome, Italy. Results showed that the proposed strategies, using a combination of coverage and radio information from multiple cells, outperform current state-of-the-art approaches based on single cell fingerprinting, with a minimum average positioning error of about 20 m when using data for a single operator that was consistent across the two datasets vs. about 70 m for the current state-of-the-art approaches. The combination of data from multiple operators and data smoothing further improved positioning accuracy, leading to a minimum average positioning error below 15 m in both urban environments.



Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication

October 2022

·

32 Reads

·

5 Citations

Computer Communications

Millimeter-wave (mmWave) radio is a key building block in 5G and beyond cellular networks. However, mmWave channels are very sensitive to environmental conditions and depend on Line-of-Sight connections to provide very high data rates. Achieving reliable, consistent communication — i.e., a steady link rate together with low delay — over mmWave links is therefore a challenging problem. The goal of this work is to explore the use of predictive control to manage and simultaneously use multiple available mmWave paths to achieve reliable consistent communication by means of a multipath proxy. We investigate transient solutions of Markov Modulated Fluid Queues (MMFQ) to model the short-term evolution of the proxy’s packet queue, consistent with the use of Markovian models to capture the behavior of mmWave channel blocking. We propose a combination of models that can be solved using newly proposed matrix-analytic techniques in a timely enough manner for use in real-time control. This gives us a prediction, over a short time horizon, of either proxy queue distributions or probabilities of reaching particular proxy buffer levels. Thus, it enables the proxy to make preemptive path decisions in order to maintain a desired Quality of Service. A proof-of-concept simulation study demonstrates the efficacy of our proposed MMFQ-based predictive approach over both static and purely reactive control approaches. Further, we explore the potential benefits of a hybrid approach to path management, combining both predictive and reactive control. This can allow the controller to cater for unforeseen events that cannot be forecast by the predictive controller, mitigating the resulting extra queuing and corresponding delay spikes. <https://davidahayes.owlstown.net/publications/35029-investigating-predictive-model-based-control-to-achieve-reliable-consistent-multipath-mmwave-communication>


In-depth study of RNTI management in mobile networks: Allocation strategies and implications on data trace analysis

October 2022

·

20 Reads

·

6 Citations

Computer Networks

The advance of mobile network technologies and components heavily relies on data-driven techniques. This is especially true for fifth generation (5G) and the upcoming sixth generation (6G) networks, as the optimization of network components and protocols is expected to be fueled by artificial intelligence (AI) based solutions. When using real-world radio access measurement traces, the identity of individual users is not directly accessible because at runtime operation Base Stations (BSs) assign Radio Network Temporary Identifiers (RNTIs) to users. RNTIs are not bound to a user but are reused upon expiration of an inactivity timer, whose duration is operator dependent. This implies that, over time, multiple users are mapped to the same RNTI. In fact, the allocation of RNTIs to users is implemented in diverse and proprietary ways by operators and equipment vendors. Distinguishing individual users within the RNTI space is a non-trivial task and key to analyze traffic traces properly. In this paper, we make the following contributions: (i) we propose and validate two complementary methodologies to identify the RNTI inactivity threshold, and we characterize (ii) the RNTI allocation process of network operators, and (iii) the user traffic patterns given the specific RNTI allocation process. Our study is based on a large dataset we collected from production BSs of several mobile network operators across five different countries. We find that there exist heterogeneous strategies for RNTI allocation that BSs dynamically use depending on the traffic load and daytime. We further observe that the RNTI expiration threshold is in the order of minutes, and demonstrate how using thresholds around 10 s, as in the vast majority of the literature, can bias subsequent analyses. Overall, our work provides an important step towards dependable mobile network trace analysis, and lays solid foundations to research relying on traffic traces for data-driven analysis.



Citations (32)


... The server's algorithm then estimates the location and sends it back to the user's device. We have selected the fingerprinting-based positioning method as it is popular in the indoor positioning community and also is widely used within IoT solutions [6]. ...

Reference:

Using ellipses to improve the estimation of the error bound on indoor positioning problems
Range-Free Positioning in NB-IoT Networks by Machine Learning
  • Citing Conference Paper
  • June 2024

... In the changing world of telecommunications, radio access networks (RAN) play a pivotal role in facilitating smooth wireless communication linking countless devices. As RAN technology progresses it becomes ever more important to have security and privacy measures, in place to protect against emerging risks and vulnerabilities [1]- [3]. Security, in the RAN has always been a focus of interest for network operators, service providers and researchers alike. ...

Experimentation in 5G and beyond Networks: State of the Art and the Way Forward

Sensors

... Further, 6G will integrate advanced technologies including terahertz communications and AI to offer even more data throughput and quality of service with much ease comparable to previous generations [106]. Although 5G and 6G have promising prospects, many challenges need to be met for them to meet future demands [109]. The expected increase in data traffic raises an issue of whether added capacity enhancements will be enough to make effective management of both data and signaling demand [110]. ...

Spotlight on 5G: Performance, Device Evolution and Challenges from a Mobile Operator Perspective
  • Citing Conference Paper
  • May 2023

... The MONROE testbed and its operation presented in [51,54,93,94] is the first open access European transnational hardware-based platform for independent, multihomed, large-scale experimentation in MBB measurements. Figure 9 shows the overview of the ...

MONROE: Measuring Mobile Broadband Networks in Europe

... For example, minute-level data can be used to optimize network deployment planning [9,14], routing [13], and to infer human and economic activities [37]. Similarly, millisecond-level data can be used to optimize resource allocation [7], channel sounding [12], congestion control over mobile networks [35] or to understand specific mechanisms like network ID assignment to users [2]. ...

In-depth study of RNTI management in mobile networks: Allocation strategies and implications on data trace analysis
  • Citing Article
  • October 2022

Computer Networks

... Model Predictive Control (MPC) is a well-established control system design technique which is based on repeated (at properly selected MPC instants) real-time optimization of a mathematical system model [2]- [5]. Aligned with the rise of computational power, the popularity of MPC has increased in recent years with novel application areas including green communications and networks [6], [7]. Based on a system model, MPC predicts the future system behavior up to a finite time horizon to obtain the optimum control actions. ...

Investigating predictive model-based control to achieve reliable consistent multipath mmWave communication
  • Citing Article
  • October 2022

Computer Communications

... A literatura apresenta propostas de frameworks que viabilizam a análise de dados de rede 5G. Os autores em [Aumayr et al. 2022] apresentam uma arquitetura de Analytics flexível e escalável, baseada em microsserviços. Testes foram realizados em um núcleo 5G NSA, 5GENESIS. ...

Service-based Analytics for 5G open experimentation platforms
  • Citing Article
  • January 2022

Computer Networks

... This paper presents the PoLicy-based Architecture for Network Slicing (PLANS), an extensive policy framework for network slice management. We build upon our previous work [1], where we extended the network slice management concept to include the dynamic configuration of the network stack on the UE devices. In this work, we consider a more comprehensive, policy-based framework where policy engines installed inside the network and on the UE devices cooperate to flexibly manage the network's resources. ...

Extending Network Slice Management to the End-host
  • Citing Conference Paper
  • August 2021

... Thus, not only department stores or stadiums but also cellular network providers may be interested on deploying beacons on their premises, since it will enable performance analysis from the user's perspective. This approach has also been studied in the literature with different perspectives, e.g., to monitor social events' impact on a network [15]. Moreover, Internet of Things (IoT) devices are also envisioned as a source of network information in [16]. ...

Cellular Network Radio Monitoring and Management through Virtual UE Probes: A Study Case Based on Crowded Events

Sensors