LLM-Based Emulation of the Radio Resource Control Layer: Towards AI-Native RAN Protocols
Ziming Liu, Bryan Liu, Alvaro Valcarce
et al.
Integrating Large AI Models (LAMs) into 6G mobile networks is a key enabler of the AI-Native Air Interface (AI-AI), where protocol intelligence must scale beyond handcrafted logic. This paper presents, to our knowledge, the first standards-compliant emulation of the Radio Resource Control (RRC) layer using a decoder-only LAM (LLAMA-class) fine-tuned with Low-Rank Adaptation (LoRA) on a multi-vendor corpus of real-world traces spanning both 5G and 4G systems. We treat RRC as a domain-specific language and construct a segmentation-safe, question-answer (Question-and-Answer (QA)) dataset that preserves Abstract Syntax Notation (ASN.1) structure through linearization prior to Byte Pair Encoding (BPE) tokenization. The proposed approach combines parameter-efficient adaptation with schema-bounded prompting to ensure syntactic and procedural fidelity. Evaluation introduces a standards-aware triad -- ASN.1 conformance, field-level coverage analysis, and uplink-to-downlink state-machine checks -- alongside semantic similarity and latency profiling across 120 configurations. On 30k 5G request-response pairs plus an additional 4.8k QA turns from 4G sessions, our 8B model achieves a median cosine similarity of 0.97, a 61% relative gain over a zero-shot baseline, while sustaining high conformance rates. These results demonstrate that LAMs, when augmented with protocol-aware reasoning, can directly orchestrate control-plane procedures, laying the foundation for the future Artificial Intelligence (AI)-native Radio Access Network (RAN).
Generative Model for Joint Resource Management in Multi-Cell Multi-Carrier NOMA Networks
Elhadj Moustapha Diallo
In this work, we design a generative artificial intelligence (GAI) -based framework for joint resource allocation, beamforming, and power allocation in multi-cell multi-carrier non-orthogonal multiple access (NOMA) networks. We formulate the proposed problem as sum rate maximization problem. Next, we design a novel multi-task transformer (MTT) framework to handle the problem in real-time. To provide the necessary training set, we consider simplified but powerful mathematical techniques from the literature. Then, we train and test the proposed MTT. We perform simulation to evaluate the efficiency of the proposed MTT and compare its performance with the mathematical baseline.
PI$^2$ Parameters
Bob Briscoe
This report gives the reasoning for the setting of the target queue delay parameter in the reference Linux implementation of PI$^2$ Active Queue Management (AQM)
Start Making Sense: Semantic Plane Filtering and Control for Post-5G Connectivity
Petar Popovski, Osvaldo Simeone
This is a short position paper that introduces the concepts of semantic plane filtering and control for post-5G connectivity.
Self-Stabilizing Disconnected Components Detection and Rooted Shortest-Path Tree Maintenance in Polynomial Steps
Stéphane Devismes, David Ilcinkas, Colette Johnen
We deal with the problem of maintaining a shortest-path tree rooted at some process r in a network that may be disconnected after topological changes. The goal is then to maintain a shortest-path tree rooted at r in its connected component, V_r, and make all processes of other components detecting that r is not part of their connected component. We propose, in the composite atomicity model, a silent self-stabilizing algorithm for this problem working in semi-anonymous networks, where edges have strictly positive weights. This algorithm does not require any a priori knowledge about global parameters of the network. We prove its correctness assuming the distributed unfair daemon, the most general daemon. Its stabilization time in rounds is at most 3nmax+D, where nmax is the maximum number of non-root processes in a connected component and D is the hop-diameter of V_r. Furthermore, if we additionally assume that edge weights are positive integers, then it stabilizes in a polynomial number of steps: namely, we exhibit a bound in O(maxi nmax^3 n), where maxi is the maximum weight of an edge and n is the number of processes.
Metis CCNx 1.0 Forwarder
Marc Mosko
Metis is the CCNx 1.0 forwarder that implements the CCNx 1.0 Semantics and Messages draft standards. This document describes how to use Metis and the internal software architecture.
Combinatorial optimization in networks with Shared Risk Link Groups
David Coudert, Stéphane Pérennes, Hervé Rivano
et al.
The notion of Shared Risk Link Groups (SRLG) captures survivability issues when a set of links of a network may fail simultaneously. The theory of survivable network design relies on basic combinatorial objects that are rather easy to compute in the classical graph models: shortest paths, minimum cuts, or pairs of disjoint paths. In the SRLG context, the optimization criterion for these objects is no longer the number of edges they use, but the number of SRLGs involved. Unfortunately, computing these combinatorial objects is NP-hard and hard to approximate with this objective in general. Nevertheless some objects can be computed in polynomial time when the SRLGs satisfy certain structural properties of locality which correspond to practical ones, namely the star property (all links affected by a given SRLG are incident to a unique node) and the span 1 property (the links affected by a given SRLG form a connected component of the network). The star property is defined in a multi-colored model where a link can be affected by several SRLGs while the span property is defined only in a mono-colored model where a link can be affected by at most one SRLG. In this paper, we extend these notions to characterize new cases in which these optimization problems can be solved in polynomial time. We also investigate the computational impact of the transformation from the multi-colored model to the mono-colored one. Experimental results are presented to validate the proposed algorithms and principles.
Robust Wireless Sensor Network Deployment
Milan Erdelj, Nathalie Mitton, Tahiry Razafindralambo
In this work we present a decentralized deployment algorithm for wireless mobile sensor networks focused on deployment Efficiency, connectivity Maintenance and network Reparation (EMR). We assume that a group of mobile sensors is placed in the area of interest to be covered, without any prior knowledge of the environment. The goal of the algorithm is to maximize the covered area and cope with sudden sensor failures. By relying on the locally available information regarding the environment and neighborhood, and without the need for any kind of synchronization in the network, each sensor iteratively chooses the next-step movement location so as to form a hexagonal lattice grid. Relying on the graph of wireless mobile sensors, we are able to provide the properties regarding the quality of coverage, the connectivity of the graph and the termination of the algorithm. We run extensive simulations to provide compactness properties of the deployment and evaluate the robustness against sensor failures. We show through the analysis and the simulations that EMR algorithm is robust to node failures and can restore the lattice grid. We also show that even after a failure, EMR algorithm call still provide a compact deployment in a reasonable time.
Evaluation des Algorithmus DIBADAWN zum Detektieren von Bruecken und Gelenkpunkten in 802.11 Maschennetzen
Robert Döring
The topic is the evaluation of the algorithm DIBADAWN to detect bridges and articulation points in an wireless mess network. Therefore this algorithm is implemented and evaluated per simulation.
TCP/IP communication between two USRP-E110
Luis Sanabria-Russo
This short report intends to provide an overview of the procedure and statistics of establishing a TCP/IP link between two USRP-E110. The testings are performed using an example GNURadio code and the networking protocol stack provided by the Linux operating system embedded in the USRP-E110.
A Multipath Transport Protocol for Future Internet
Bachir Chihani, Collange Denis
A Multipath Transport Protocol for Future Internet
A grid environment consisting of heterogeneous compute resources for high performance computation
Fred Viezens
This paper has been withdrawn.
Non Unitary Random Walks
Philippe Jacquet
Motivated by the recent refutation of information loss paradox in black hole by Hawking, we investigate the new concept of {\it non unitary random walks}. In a non unitary random walk, we consider that the state 0, called the {\it black hole}, has a probability weight that decays exponentially in $e^{-\lambda t}$ for some $\lambda>0$. This decaying probabilities affect the probability weight of the other states, so that the the apparent transition probabilities are affected by a repulsion factor that depends on the factors $\lambda$ and black hole lifetime $t$. If $\lambda$ is large enough, then the resulting transition probabilities correspond to a neutral random walk. We generalize to {\it non unitary gravitational walks} where the transition probabilities are function of the distance to the black hole. We show the surprising result that the black hole remains attractive below a certain distance and becomes repulsive with an exactly reversed random walk beyond this distance. This effect has interesting analogy with so-called dark energy effect in astrophysics.
Combinatorial Route to Algebra: The Art of Composition & Decomposition
Pawel Blasiak
We consider a general concept of composition and decomposition of objects, and discuss a few natural properties one may expect from a reasonable choice thereof. It will be demonstrated how this leads to multiplication and co-multiplication laws, thereby providing a generic scheme furnishing combinatorial classes with an algebraic structure. The paper is meant as a gentle introduction to the concepts of composition and decomposition with the emphasis on combinatorial origin of the ensuing algebraic constructions.
Network Coding for Delay Tolerant Networks with Byzantine Adversaries
Lucile Sassatelli, Muriel Medard
This article has been withdrawn by the authors
Beyond Node Degree: Evaluating AS Topology Models
Hamed Haddadi, D. Fay, A. Jamakovic
et al.
This is the accepted version of 'Beyond Node Degree: Evaluating AS Topology Models', archived originally at arXiv:0807.2023v1 [cs.NI] 13 July 2008.
25 sitasi
en
Computer Science
On the metric distortion of nearest-neighbour graphs on random point sets
Amitabha Bagchi, Sohit Bansal
We study the graph constructed on a Poisson point process in $d$ dimensions by connecting each point to the $k$ points nearest to it. This graph a.s. has an infinite cluster if $k > k_c(d)$ where $k_c(d)$, known as the critical value, depends only on the dimension $d$. This paper presents an improved upper bound of 188 on the value of $k_c(2)$. We also show that if $k \geq 188$ the infinite cluster of $\NN(2,k)$ has an infinite subset of points with the property that the distance along the edges of the graphs between these points is at most a constant multiplicative factor larger than their Euclidean distance. Finally we discuss in detail the relevance of our results to the study of multi-hop wireless sensor networks.
Phase Diagrams of Network Traffic
Reginald D. Smith
This paper has been withdrawn due to errors in the analysis of data with Carrier Access Rate control and statistical methodologies.
On the Value of a Social Network
Sandeep Chalasani
In this paper we investigate the value of a social network with respect to the probability mechanism underlying its structure. Specifically, we compute the value for small world and scale free networks. We provide evidence in support of the value to be given by Zipfs law.
Towards Informative Statistical Flow Inversion
R. Clegg, H. Haddadi, R. Landa
et al.
This is the accepted version of 'Towards Informative Statistical Flow Inversion', archived originally at arXiv:0705.1939v1 [cs.NI] 14 May 2007.
1 sitasi
en
Computer Science