https://arxiv.org/api/Tsfmx3ZkduSki7zixFWNDIbA3UE2026-03-26T14:07:05Z2683925515http://arxiv.org/abs/2602.21315v2The Instability of all Backoff Protocols2026-03-03T18:29:11ZIn this paper we prove Aldous's conjecture from 1987 that there is no backoff protocol that is stable for any positive arrival rate. The setting is a communication channel for coordinating requests for a shared resource. Each user who wants to access the resource makes a request by sending a message to the channel. The users don't have any way to communicate with each other, except by sending messages to the channel. The operation of the channel proceeds in discrete time steps. If exactly one message is sent to the channel during a time step then this message succeeds (and leaves the system). If multiple messages are sent during a time step then these messages collide. Each of the users that sent these messages therefore waits a random amount of time before re-sending. A backoff protocol is a randomised algorithm for determining how long to wait -- the waiting time is a function of how many collisions a message has had. Specifically, a backoff protocol is described by a send sequence $\overline{p} = (p_0,p_1,p_2,\ldots)$. If a message has had $k$ collisions before a time step then, with probability $p_k$, it sends during that time step, whereas with probability $1-p_k$ it is silent (waiting for later). The most famous backoff protocol is binary exponential backoff, where $p_k = 2^{-k}$. Under Kelly's model, in which the number of new messages that arrive in the system at each time step is given by a Poisson random variable with mean $λ$, Aldous proved that binary exponential backoff is unstable for any positive $λ$. He conjectured that the same is true for any backoff protocol. We prove this conjecture.2026-02-24T19:36:39ZLeslie Ann GoldbergJohn Lapinskashttp://arxiv.org/abs/2603.03146v1Channel-Adaptive Edge AI: Maximizing Inference Throughput by Adapting Computational Complexity to Channel States2026-03-03T16:33:29Z\emph{Integrated communication and computation} (IC$^2$) has emerged as a new paradigm for enabling efficient edge inference in sixth-generation (6G) networks. However, the design of IC$^2$ technologies is hindered by the lack of a tractable theoretical framework for characterizing \emph{end-to-end} (E2E) inference performance. The metric is highly complicated as it needs to account for both channel distortion and artificial intelligence (AI) model architecture and computational complexity. In this work, we address this challenge by developing a tractable analytical model for E2E inference accuracy and leveraging it to design a \emph{channel-adaptive AI} algorithm that maximizes inference throughput, referred to as the edge processing rate (EPR), under latency and accuracy constraints. Specifically, we consider an edge inference system in which a server deploys a backbone model with early exit, which enables flexible computational complexity, to perform inference on data features transmitted by a mobile device. The proposed accuracy model characterizes high-dimensional feature distributions in the angular domain using a Mixture of von Mises (MvM) distribution. This leads to a desired closed-form expression for inference accuracy as a function of quantization bit-width and model traversal depth, which represents channel distortion and computational complexity, respectively. Building upon this accuracy model, we formulate and solve the EPR maximization problem under joint latency and accuracy constraints, leading to a channel-adaptive AI algorithm that achieves full IC$^2$ integration. The proposed algorithm jointly adapts transmit-side feature compression and receive-side model complexity according to channel conditions to maximize overall efficiency and inference throughput. Experimental results demonstrate its superior performance as compared with fixed-complexity counterparts.2026-03-03T16:33:29Z14 pages, 14 figuresJierui ZhangJianhao HuangKaibin Huanghttp://arxiv.org/abs/2603.03039v1Exploiting Repetitions and Interference Cancellation for the 6G-V2X Sidelink Autonomous Mode2026-03-03T14:29:22ZIn recent years, the Third Generation Partnership Project (3GPP) has developed the new radio-vehicle-to-everything (NR-V2X) sidelink standard, to enable direct communication between connected and autonomous vehicles (CAVs). Users can autonomously select radio resources for their transmissions with the Mode 2 channel access scheme, which can also operate under out-of-coverage conditions. However, Mode 2 performance is hindered by interference and packet collisions arising from dynamic mobile environments and limitations in assessing radio resource availability. The 3GPP specifications allow transmitting multiple copies of the same packet to improve reliability, though at the cost of increased channel congestion. This paper proposes to leverage receivers equipped with successive interference cancellation (SIC) capabilities, to exploit packet repetitions. Specifically, once a packet is successfully decoded the interfering contribution carried by repetitions can be cancelled from future or past received signals, enabling the decoding of new packets. Extensive highway scenario simulations demonstrate that the proposed solution significantly outperforms the legacy Mode 2 scheme, especially under high interference conditions, achieving improvements exceeding 100% in some cases.2026-03-03T14:29:22ZIEEE Transactions on Vehicular Technology (Volume: 75, Issue: 1, January 2026)Alessandro BazziVittorio TodiscoAntonella MolinaroAntoine O. BerthetRichard A. Stirling-GallacherClaudia Campolo10.1109/TVT.2025.3592028http://arxiv.org/abs/2502.03300v2Scalable Interference Graph Learning for Low-Latency Wi-Fi Networks using Hashing-based Evolution Strategy2026-03-03T13:10:16ZWi-Fi 7 introduces the restricted target wake time (RTWT) mechanism, which is vital for Industrial IoT (IIoT) applications requiring periodic, reliable, and low-latency communication. RTWT enables deterministic channel access by assigning scheduled transmission slots to stations (STAs), minimizing contention and interference. However, determining efficient RTWT slot assignments remains challenging in dense networks, where conventional interference graph-based models lack flexibility and scalability. To overcome this, we propose a scalable interference graph learning (IGL) framework that learns optimal interference graph representations for graph coloring-based RTWT scheduling. The IGL leverages an evolution strategy (ES) to train a neural network (NN) using a single network-wide reward, avoiding costly edge-wise feedback. Furthermore, a deep hashing function (DHF) groups interfering STAs, limiting training and inference to relevant subsets and greatly reducing complexity. Simulation results demonstrate that the proposed IGL improves slot efficiency by up to 25\%, reduces packet losses by up to 30\% in dynamic environments. Thanks to DHF, it also reduces the training and inference time of IGL by 4 and 8 times, respectively, and the online slot assignment time by 3 times in large networks.2025-02-05T15:58:44ZThis work has been submitted to an IEEE journal for possible publicationZhouyou GuJihong ParkJinho Choihttp://arxiv.org/abs/2602.10823v3Less is More: The Dilution Effect in Multi-Link Wireless Sensing2026-03-03T11:16:14ZWireless sensing approaches promise to transform smart infrastructures into privacy-preserving motion detectors, yet commercial adoption remains limited. A common assumption may explain this gap: that denser sensor deployments yield better accuracy. We tested this assumption with a 12-day naturalistic study using a 9-node ESP32-C3 mesh (72 sensing links) in a residential environment. Our results show that a single well-placed link outperformed the full 72-link mesh (AUC 0.541 vs. 0.489, Cohen's $d$=0.86). Even a random link selection matched optimized selection ($p$=0.35). The benefit comes from avoiding multi-link fusion, not from choosing the right link. We attribute this to a "dilution effect": links whose Fresnel zones miss activity regions contribute noise that overwhelms signal from informative links. In our deployment, strategic link placement mattered 2.7$\times$ more than classifier choice. We release 312 hours of labeled CSI data, firmware, and analysis code to enable validation across diverse environments.2026-02-11T13:05:13ZKarim KhamaisiBruno Rodrigueshttp://arxiv.org/abs/2603.01263v2A Border Gateway Protocol Extension for Distributing Endpoint Identifier Reachability Information in Delay-tolerant Networks2026-03-03T11:09:23ZThe Delay-Tolerant Networking (DTN) community has created solid results during the last three decades. One aspect that still requires focus, however, is the simplification of configuring systems participating in DTN communication. In this workshop paper, an approach is proposed for configuring DTN endpoint reachability. The core idea is to extend the Border Gateway Protocol (BGP), enabling it to advertise the reachability of DTN endpoints specified by Endpoint Identifiers (EIDs) via specific next-hop Convergence Layer Adapters (CLAs). The approach is mainly intended for usage in edge nodes accessible from an IP network, which communicate via a DTN gateway to a larger DTN infrastructure. It may be applied to simplify access to the Solar System Internet from hosts connected to the Internet. The feasibility of the approach has been confirmed using an implementation intended for validation purposes.2026-03-01T20:40:15ZThis is the authors' version of a paper that was originally presented at the Space-Terrestrial Internetworking Workshop (STINT'25), which was co-located with the IEEE WiSEE 2025 conference, see https://doi.org/10.1109/WiSEE57913.2025.1122983513th IEEE International Conference on Wireless for Space and Extreme Environments (WiSEE 2025), Halifax, NS, Canada, 13-15 Oct 2025Marius FeldmannThéo TchilinguirianFelix Walter10.1109/WiSEE57913.2025.11229835http://arxiv.org/abs/2603.02857v1An Extensible Quantum Network Simulator Built on ns-3: Q2NS Design and Evaluation2026-03-03T11:05:38ZAs quantum networking hardware remains costly and not yet widely accessible, simulation tools are essential for the design and evaluation of quantum network architectures and protocols. However, designing a scalable and computationally efficient quantum network simulator is intrinsically challenging: i) quantum dynamics must be emulated on classical computing platforms while capturing the stateful and non-local nature of entanglement, a quantum resource without any classical networking analog; ii) quantum networking is inherently hybrid, as protocol execution also fundamentally depends on classical signaling. This makes a tight and faithful co-simulation of quantum operations and classical message exchanges a core requirement. In this light, we present Q2NS, a modular and extensible quantum network simulator, built on top of ns-3, designed to seamlessly integrate quantum-network primitives with ns-3's established classical protocol stack. Q2NS adopts a modular architecture that decouples protocol control logic from node- and channel-level operations, enabling rapid prototyping and adaptation across heterogeneous and evolving Quantum Internet scenarios. Q2NS natively supports multiple quantum state representations through a unified interface, allowing interchangeable state-vector, density-matrix, and stabilizer backends. We validate Q2NS through realistic use-case studies and comprehensive benchmarks, demonstrating superior computational efficiency over representative state-of-the-art alternatives, while preserving modeling flexibility. Finally, we provide a dedicated visualization tool that jointly captures physical and entanglement-enabled connectivity and supports entangled-state manipulations, facilitating an intuitive interpretation of entanglement dynamics and protocol behavior. Q2NS offers a flexible, open, and scalable simulation platform for advancing Quantum Internet research.2026-03-03T11:05:38ZThis work has been funded by the European Union under Horizon Europe ERC-CoG grant QNattyNet ("Quantum-Native Communication Networks: from Quantum Message to Quantum Functioning"), n.101169850. Details at https://qnattynet.quantuminternet.itAdam PearsonFrancesco MazzaMarcello CaleffiAngela Sara Cacciapuotihttp://arxiv.org/abs/2204.13547v4Generic Dijkstra2026-03-03T10:20:44ZThe recently-proposed generic Dijkstra algorithm finds shortest paths in networks with continuous and contiguous resources. While the algorithm was proposed in the context of optical networks (and is applicable to other networks with finite and discrete resources), we present the stated problem in a broader algorithmic setting of the greedy approach. The algorithm was published without a proof of correctness, and with a minor shortcoming. We provide that missing proof and offer a correction to the shortcoming. To prove the algorithm correct, we generalize the greedy approach and the Bellman principle of optimality to algebraic structures with a partial ordering. By analyzing the size of the search space in the worst-case, we argue the stated problem is tractable. Thus we definitely answer a long-standing fundamental question of whether we can efficiently find a shortest path in a network with discrete resources subject to the continuity and contiguity constraints: yes, we can.2022-04-28T14:56:30ZAn extended version for a journal submissionNOMS 2023-2023 IEEE/IFIP Network Operations and Management SymposiumIreneusz SzcześniakBożena Woźna-SzcześniakIreneusz Olszewski10.1109/NOMS56928.2023.10154322http://arxiv.org/abs/2603.02784v1Energy Efficient Point-to-Point PON-based Architecture for the Backhaul of a VLC System2026-03-03T09:24:54ZThis paper proposes a point-to-point passive optical network (P2P-PON) architecture as an energy-efficient and low-latency backhaul solution for visible light communication (VLC)-enabled indoor fog computing systems. The proposed architecture passively interconnects VLC access points and distributed in-building fog servers through dedicated optical links, enabling flexible peer-to-peer connectivity and efficient traffic aggregation. A mixed integer linear programming (MILP) framework is developed to jointly optimize processing resource allocation, traffic routing, power consumption, and end-to-end queuing delay across a multi-layer fog computing infrastructure. The model explicitly captures the power consumption of both networking and processing elements and incorporates a piecewise linear approximation of an M/M/1 queuing model to represent delay-sensitive applications. The performance of the proposed P2P-PON architecture is evaluated and compared against an arrayed waveguide grating router (AWGR)-based PON architecture under multiple indoor traffic scenarios. The results show that the proposed P2P-PON architecture reduces total power consumption by up to 64\% under power-aware optimization and by 15\% under delay-aware optimization, while reducing average end-to-end queuing delay by up to 76\% compared to the AWGR-PON architecture, due to the improved in-building connectivity and more effective utilization of distributed fog resources.2026-03-03T09:24:54ZWafaa B. M. FadlelmulaSanaa Hamid MohamedTaisir E. H. El-GorashiJaafar M. H. Elmirghanihttp://arxiv.org/abs/2603.02740v1GPR Hierarchical Synergistic Framework for Multi-Access MPQUIC in SAGINs2026-03-03T08:42:20ZThe deployment of Multipath QUIC (MPQUIC) in Unmanned Aerial Vehicle (UAV)-assisted Space-Air-Ground Integrated Networks (SAGINs) is severely hampered by the out-of-order (OFO) packet delivery problem. Frequent stream handovers, high mobility, and massive multi-access contention in these networks introduce severe transport-layer challenges. Existing solutions typically isolate multipath scheduling from congestion control, which leads to suboptimal performance and transient congestion in highly dynamic environments. To overcome these limitations, this paper proposes the GPR Hierarchical Synergistic Framework, representing the first joint optimization of multipath scheduling and congestion control for multi-access MPQUIC in SAGINs. Our framework introduces the GradNorm Probabilistic Self-Predictive (GPASP) module to forecast latent states and filter task-irrelevant information in high-dimensional, noisy observation spaces. Furthermore, we develop a Proactive Handover-Aware Congestion Control (PHACC) algorithm that leverages neural network-driven decisions to proactively distinguish handover-induced packet losses from actual network congestion. To address decision-making lag caused by neural network inference latency, a Neural-network Preference Estimation (NNPE) algorithm is designed for highly efficient, real-time scheduling. Extensive ns-3 simulations demonstrate that the proposed framework significantly outperforms state-of-the-art baselines, achieving substantial goodput improvements and a marked reduction in OFO degrees.2026-03-03T08:42:20ZHanjian LiuJinsong Guihttp://arxiv.org/abs/2603.02679v1RegTrack: Uncovering Global Disparities in Third-party Advertising and Tracking2026-03-03T07:21:15ZThird party advertising and tracking (A&T) are pervasive across the web, yet user exposure varies significantly with browser choice, browsing location, and hosting jurisdiction. We systematically study how these three factors shape tracking by conducting synchronized crawls of 743 popular websites from 8 geographic vantage points using 4 browsers and 2 consent states. Our analysis reveals that browser choice, user location, and hosting jurisdiction each shape tracking exposure in distinct ways. Privacy focused browsers block more third party trackers, reducing observed A&T domains by up to 30% in permissive regulatory environments, but offer smaller relative gains in stricter regions. User location influences the tracking volume, the prevalence of consent banners, and the extent of cross border tracking: GDPR regulated locations exhibit about 80% fewer third party A&T domains before consent and keep 89-91% of A&T requests within the EEA or adequacy countries. Hosting jurisdiction plays a smaller role; tracking exposure varies most strongly with inferred user location rather than where sites are hosted. These findings underscore both the power and limitations of user agency, informing the design of privacy tools, regulatory enforcement strategies, and future measurement methodologies.2026-03-03T07:21:15ZPresented at NDSS Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2026Tanya PrasadRut VoraSoo Yee LimNguyen Phong HoangThomas Pasquier10.14722/madweb.2026.23010http://arxiv.org/abs/2603.02610v1Rate-Fidelity Tradeoffs in All-Photonic and Memory-Equipped Quantum Switches2026-03-03T05:30:06ZQuantum entanglement switches are a key building block for early quantum networks, and a central design question is whether near-term devices should use only flying photons or also incorporate quantum memories. We compare two architectures: an all-photonic entanglement generation switch (EGS) that repeatedly attempts Bell-state measurements (BSM) without storing qubits, and a quantum memory-equipped switch that buffers entanglement and triggers measurements only when heralded connectivity is available (herald-then-swap control). These two designs trade off simple, memoryless operation that avoids decoherence and memory-induced latency against heralding-based control that buffers entanglement to use BSMs more efficiently. We formalize both models under a common hardware abstraction and characterize their achievable rate-fidelity regions, yielding a benchmarking methodology that translates hardware and protocol parameters into network-level performance. Numerical evaluation quantifies the rate-fidelity tradeoffs of both models, identifies operating regions in which each architecture dominates, and shows how hardware and protocol knobs can be tuned to meet application-specific targets.2026-03-03T05:30:06ZPanagiotis PromponasLeonardo BacciottiniPaul PolakosGayane VardoyanDon TowsleyLeandros Tassiulashttp://arxiv.org/abs/2603.06669v1Hybrid Orchestration of Edge AI and Microservices via Graph-based Self-Imitation Learning2026-03-03T03:54:04ZModern edge AI applications increasingly rely on microservice architectures that integrate both AI services and conventional microservices into complex request chains with stringent latency requirements. Effectively orchestrating these heterogeneous services is crucial for ensuring low-latency performance, yet remains challenging due to their diverse resource demands and strong operational interdependencies under resource-constrained edge environments. In particular, frequent interactions between services tightly couple deployment and routing decisions, yet existing approaches optimize them in isolation, leading to fundamentally inadequate system performance.In this paper, we propose SIL-GPO, a reinforcement learning framework that optimizes hybrid orchestration for edge AI microservice systems. SIL-GPO formulates the orchestration problem as a sequential decision-making task and leverages graph attention networks to encode service topologies and routing dependencies within the agent state representation. Moreover, SIL-GPO integrates a self-imitation learning strategy into proximal policy optimization, enabling the agent to prioritize and reuse high-reward trajectories. This guides policy updates towards globally promising solutions that standard RL often fails to discover under sparse rewards and large combinatorial action spaces. We conduct extensive experiments on trace-driven edge AI workloads, demonstrating that SIL-GPO significantly reduces end-to-end service latency and enhances resource utilization compared to state-of-the-art heuristic, metaheuristic, and deep RL baselines. Our framework offers a unified and scalable solution for efficient orchestration of AI services and microservices in the edge, paving the way for low-latency, high-performance edge AI deployments.2026-03-03T03:54:04ZChen YangJin ZhengYang ZhuolinLai PanZhang XiaoHu MenglanYin Haiyanhttp://arxiv.org/abs/2603.02558v1Integrating Health Sensing into Cellular Networks: Human Sleep Monitoring Using 5G Signals2026-03-03T03:21:23ZCellular networks offer a unique opportunity to enable device-free and wide-area health monitoring by exploiting the sensitivity of radio-frequency (RF) propagation to human physiological activities. In this paper, we present the first experimental study of human sleep monitoring using realistic 5G signals collected from commercial cellular infrastructure. We investigate a practical scenario in which a smartphone is placed near a bed, and a 5G base station periodically configures uplink sounding reference signal (SRS) transmissions to obtain fine-grained channel state information (CSI). Leveraging uplink CSI measurements, we design a lightweight signal processing pipeline for respiration rate estimation and a CNN model for sleep body movement classification. Through extensive experiments conducted on an indoor private 5G network, our system achieves over 91.2% accuracy in respiration rate estimation and 85.5% accuracy in sleep movement classification.2026-03-03T03:21:23ZRuxin LinPeihao YanJie LuQijun WangHuacheng Zenghttp://arxiv.org/abs/2204.14133v2Network Topology Optimization via Deep Reinforcement Learning2026-03-03T02:59:58ZTopology impacts important network performance metrics, including link utilization, throughput and latency, and is of central importance to network operators. However, due to the combinatorial nature of network topology, it is extremely difficult to obtain an optimal solution, especially since topology planning in networks also often comes with management-specific constraints. As a result, local optimization with hand-tuned heuristic methods from human experts is often adopted in practice. Yet, heuristic methods cannot cover the global topology design space while taking into account constraints, and cannot guarantee to find good solutions.
In this paper, we propose a novel deep reinforcement learning (DRL) algorithm for graph searching, called DRL-GS, for network topology optimization. DRL-GS consists of three novel components, including a verifier to validate the correctness of a generated network topology, a graph neural network (GNN) to efficiently approximate topology rating, and a DRL agent to conduct a topology search. DRL-GS can efficiently search over relatively large topology space and output topology with satisfactory performance. We conduct a case study based on a real-world network scenario, and our experimental results demonstrate the superior performance of DRL-GS in terms of both efficiency and performance.2022-04-19T07:45:07ZZhuoran LiXing WangLing PanLin ZhuZhendong WangJunlan FengChao DengLongbo Huang