2 research outputs found

    Bio-Inspired Resource Allocation for Relay-Aided Device-to-Device Communications

    Full text link
    The Device-to-Device (D2D) communication principle is a key enabler of direct localized communication between mobile nodes and is expected to propel a plethora of novel multimedia services. However, even though it offers a wide set of capabilities mainly due to the proximity and resource reuse gains, interference must be carefully controlled to maximize the achievable rate for coexisting cellular and D2D users. The scope of this work is to provide an interference-aware real-time resource allocation (RA) framework for relay-aided D2D communications that underlay cellular networks. The main objective is to maximize the overall network throughput by guaranteeing a minimum rate threshold for cellular and D2D links. To this direction, genetic algorithms (GAs) are proven to be powerful and versatile methodologies that account for not only enhanced performance but also reduced computational complexity in emerging wireless networks. Numerical investigations highlight the performance gains compared to baseline RA methods and especially in highly dense scenarios which will be the case in future 5G networks.Comment: 6 pages, 6 figure

    Application-Layer FEC Scheme Configuration Optimization via Hybrid Simulated Annealing

    Full text link
    An optimization technique based on an adapted combination of simulated annealing (SA) and tabu search (TS) is presented. This method aims at finding near-optimal unequal error protection (UEP) application-layer FEC code configurations. This approach is intended to smartly protect audio and video transmission over IP networks when hard time restrictions apply. The considered code is a UEP version of the widely-used Pro-MPEG COP3 codes enabling the use of several matrices of dissimilar size and thus of unequal recovery capability. Finding the optimal configuration frequently requires the evaluation of a large solution space. So, to fulfill the imposed constraints, SA is adapted to the specifics of the scenario. In particular, the annealing schedule is conditioned by the real-time restrictions. Furthermore, solution neighborhood structures are determined by a proposed definition of distance between protection configurations, which, jointly with TS, conditions the selection of candidate solutions. Experimental results show a significantly improved performance of the optimization process, which invariably fulfills imposed timing constraints, at the expense of a very low distortion increase, when compared to using exhaustive search. These results allow the use of UEP Pro-MPEG COP3 codes for protecting video and audio transmission, which distinctly outperforms the standard code in a wide range of scenarios
    corecore