3,584 research outputs found
Energy-saving Resource Allocation by Exploiting the Context Information
Improving energy efficiency of wireless systems by exploiting the context
information has received attention recently as the smart phone market keeps
expanding. In this paper, we devise energy-saving resource allocation policy
for multiple base stations serving non-real-time traffic by exploiting three
levels of context information, where the background traffic is assumed to
occupy partial resources. Based on the solution from a total energy
minimization problem with perfect future information,a context-aware BS
sleeping, scheduling and power allocation policy is proposed by estimating the
required future information with three levels of context information.
Simulation results show that our policy provides significant gains over those
without exploiting any context information. Moreover, it is seen that different
levels of context information play different roles in saving energy and
reducing outage in transmission.Comment: To be presented at IEEE PIMRC 2015, Hong Kong. This work was
supported by National Natural Science Foundation of China under Grant
61120106002 and National Basic Research Program of China under Grant
2012CB31600
Quantifying Potential Energy Efficiency Gain in Green Cellular Wireless Networks
Conventional cellular wireless networks were designed with the purpose of
providing high throughput for the user and high capacity for the service
provider, without any provisions of energy efficiency. As a result, these
networks have an enormous Carbon footprint. In this paper, we describe the
sources of the inefficiencies in such networks. First we present results of the
studies on how much Carbon footprint such networks generate. We also discuss
how much more mobile traffic is expected to increase so that this Carbon
footprint will even increase tremendously more. We then discuss specific
sources of inefficiency and potential sources of improvement at the physical
layer as well as at higher layers of the communication protocol hierarchy. In
particular, considering that most of the energy inefficiency in cellular
wireless networks is at the base stations, we discuss multi-tier networks and
point to the potential of exploiting mobility patterns in order to use base
station energy judiciously. We then investigate potential methods to reduce
this inefficiency and quantify their individual contributions. By a
consideration of the combination of all potential gains, we conclude that an
improvement in energy consumption in cellular wireless networks by two orders
of magnitude, or even more, is possible.Comment: arXiv admin note: text overlap with arXiv:1210.843
JAG: Reliable and Predictable Wireless Agreement under External Radio Interference
Wireless low-power transceivers used in sensor networks typically operate in unlicensed frequency bands that are subject to external radio interference caused by devices transmitting at much higher power.communication protocols should therefore be designed to be robust against such interference. A critical building block of many protocols at all layers is agreement on a piece of information among a set of nodes. At the MAC layer, nodes may need to agree on a new time slot or frequency channel, at the application layer nodes may need to agree on handing over a leader role from one node to another. Message loss caused by interference may break agreement in two different ways: none of the nodes uses the new information (time slot, channel, leader) and sticks with the previous assignment, or-even worse-some nodes use the new information and some do not. This may lead to reduced performance or failures. In this paper, we investigate the problem of agreement under external radio interference and point out the limitations of traditional message-based approaches. We propose JAG, a novel protocol that uses jamming instead of message transmissions to make sure that two neighbouring nodes agree, and show that it outperforms message-based approaches in terms of agreement probability, energy consumption, and time-to-completion. We further show that JAG can be used to obtain performance guarantees and meet the requirements of applications with real-time constraints.CONETReSens
- …