5,755 research outputs found
Applications of Soft Computing in Mobile and Wireless Communications
Soft computing is a synergistic combination of artificial intelligence methodologies to model and solve real world problems that are either impossible or too difficult to model mathematically. Furthermore, the use of conventional modeling techniques demands rigor, precision and certainty, which carry computational cost. On the other hand, soft computing utilizes computation, reasoning and inference to reduce computational cost by exploiting tolerance for imprecision, uncertainty, partial truth and approximation. In addition to computational cost savings, soft computing is an excellent platform for autonomic computing, owing to its roots in artificial intelligence. Wireless communication networks are associated with much uncertainty and imprecision due to a number of stochastic processes such as escalating number of access points, constantly changing propagation channels, sudden variations in network load and random mobility of users. This reality has fuelled numerous applications of soft computing techniques in mobile and wireless communications. This paper reviews various applications of the core soft computing methodologies in mobile and wireless communications
Interworking Architectures in Heterogeneous Wireless Networks: An Algorithmic Overview
The scarce availability of spectrum and the proliferation of
smartphones, social networking applications, online gaming
etc., mobile network operators (MNOs) are faced with an
exponential growth in packet switched data requirements on
their networks. Haven invested in legacy systems (such as
HSPA, WCDMA, WiMAX, Cdma2000, LTE, etc.) that have
hitherto withstood the current and imminent data usage
demand, future and projected usage surpass the capabilities of the evolution of these individual technologies. Hence, a more critical, cost-effective and flexible approach to provide ubiquitous coverage for the user using available spectrum is of high demand. Heterogeneous Networks make use of these legacy systems by allowing users to connect to the best network available and most importantly seamlessly handover active sessions amidst them. This paper presents a survey of interworking architectures between IMT 2000 candidate networks that employ the use of IEFT protocols such as MIP, mSCTP, HIP, MOBIKE, IKEV2 and SIP etc. to bring about this much needed capacity
Reducing Message Collisions in Sensing-based Semi-Persistent Scheduling (SPS) by Using Reselection Lookaheads in Cellular V2X
In the C-V2X sidelink Mode 4 communication, the sensing-based semi-persistent
scheduling (SPS) implements a message collision avoidance algorithm to cope
with the undesirable effects of wireless channel congestion. Still, the current
standard mechanism produces high number of packet collisions, which may hinder
the high-reliability communications required in future C-V2X applications such
as autonomous driving. In this paper, we show that by drastically reducing the
uncertainties in the choice of the resource to use for SPS, we can
significantly reduce the message collisions in the C-V2X sidelink Mode 4.
Specifically, we propose the use of the "lookahead," which contains the next
starting resource location in the time-frequency plane. By exchanging the
lookahead information piggybacked on the periodic safety message, vehicular
user equipments (UEs) can eliminate most message collisions arising from the
ignorance of other UEs' internal decisions. Although the proposed scheme would
require the inclusion of the lookahead in the control part of the packet, the
benefit may outweigh the bandwidth cost, considering the stringent reliability
requirement in future C-V2X applications.Comment: Submitted to MDPI Sensor
Auction-based Bandwidth Allocation Mechanisms for Wireless Future Internet
An important aspect of the Future Internet is the efficient utilization of
(wireless) network resources. In order for the - demanding in terms of QoS -
Future Internet services to be provided, the current trend is evolving towards
an "integrated" wireless network access model that enables users to enjoy
mobility, seamless access and high quality of service in an all-IP network on
an "Anytime, Anywhere" basis. The term "integrated" is used to denote that the
Future Internet wireless "last mile" is expected to comprise multiple
heterogeneous geographically coexisting wireless networks, each having
different capacity and coverage radius. The efficient management of the
wireless access network resources is crucial due to their scarcity that renders
wireless access a potential bottleneck for the provision of high quality
services. In this paper we propose an auction mechanism for allocating the
bandwidth of such a network so that efficiency is attained, i.e. social welfare
is maximized. In particular, we propose an incentive-compatible, efficient
auction-based mechanism of low computational complexity. We define a repeated
game to address user utilities and incentives issues. Subsequently, we extend
this mechanism so that it can also accommodate multicast sessions. We also
analyze the computational complexity and message overhead of the proposed
mechanism. We then show how user bids can be replaced from weights generated by
the network and transform the auction to a cooperative mechanism capable of
prioritizing certain classes of services and emulating DiffServ and time-of-day
pricing schemes. The theoretical analysis is complemented by simulations that
assess the proposed mechanisms properties and performance. We finally provide
some concluding remarks and directions for future research
Traffic Offloading/Onloading in Multi-RAT Cellular Networks
We analyze next generation cellular networks, offering connectivity to mobile users through multiple radio access technologies (RATs), namely LTE and WiFi. We develop a framework based on the Markovian agent formalism, which can model several aspects of the system, including user traffic dynamics and radio resource allocation. In particular, through a mean-field solution, we show the ability of our framework to capture the system behavior in flash-crowd scenarios, i.e., when a burst of traffic requests takes place in some parts of the network service area. We consider a distributed strategy for the user RAT selection, which aims at ensuring high user throughput, and investigate its performance under different resource allocation scheme
- …