263,217 research outputs found

    Applications of Soft Computing in Mobile and Wireless Communications

    Get PDF
    Soft computing is a synergistic combination of artificial intelligence methodologies to model and solve real world problems that are either impossible or too difficult to model mathematically. Furthermore, the use of conventional modeling techniques demands rigor, precision and certainty, which carry computational cost. On the other hand, soft computing utilizes computation, reasoning and inference to reduce computational cost by exploiting tolerance for imprecision, uncertainty, partial truth and approximation. In addition to computational cost savings, soft computing is an excellent platform for autonomic computing, owing to its roots in artificial intelligence. Wireless communication networks are associated with much uncertainty and imprecision due to a number of stochastic processes such as escalating number of access points, constantly changing propagation channels, sudden variations in network load and random mobility of users. This reality has fuelled numerous applications of soft computing techniques in mobile and wireless communications. This paper reviews various applications of the core soft computing methodologies in mobile and wireless communications

    Fuzzy based load and energy aware multipath routing for mobile ad hoc networks

    Get PDF
    Routing is a challenging task in Mobile Ad hoc Networks (MANET) due to their dynamic topology and lack of central administration. As a consequence of un-predictable topology changes of such networks, routing protocols employed need to accurately capture the delay, load, available bandwidth and residual node energy at various locations of the network for effective energy and load balancing. This paper presents a fuzzy logic based scheme that ensures delay, load and energy aware routing to avoid congestion and minimise end-to-end delay in MANETs. In the proposed approach, forwarding delay, average load, available bandwidth and residual battery energy at a mobile node are given as inputs to a fuzzy inference engine to determine the traffic distribution possibility from that node based on the given fuzzy rules. Based on the output from the fuzzy system, traffic is distributed over fail-safe multiple routes to reduce the load at a congested node. Through simulation results, we show that our approach reduces end-to-end delay, packet drop and average energy consumption and increases packet delivery ratio for constant bit rate (CBR) traffic when compared with the popular Ad hoc On-demand Multipath Distance Vector (AOMDV) routing protocol

    A Resource Intensive Traffic-Aware Scheme for Cluster-based Energy Conservation in Wireless Devices

    Full text link
    Wireless traffic that is destined for a certain device in a network, can be exploited in order to minimize the availability and delay trade-offs, and mitigate the Energy consumption. The Energy Conservation (EC) mechanism can be node-centric by considering the traversed nodal traffic in order to prolong the network lifetime. This work describes a quantitative traffic-based approach where a clustered Sleep-Proxy mechanism takes place in order to enable each node to sleep according to the time duration of the active traffic that each node expects and experiences. Sleep-proxies within the clusters are created according to pairwise active-time comparison, where each node expects during the active periods, a requested traffic. For resource availability and recovery purposes, the caching mechanism takes place in case where the node for which the traffic is destined is not available. The proposed scheme uses Role-based nodes which are assigned to manipulate the traffic in a cluster, through the time-oriented backward difference traffic evaluation scheme. Simulation study is carried out for the proposed backward estimation scheme and the effectiveness of the end-to-end EC mechanism taking into account a number of metrics and measures for the effects while incrementing the sleep time duration under the proposed framework. Comparative simulation results show that the proposed scheme could be applied to infrastructure-less systems, providing energy-efficient resource exchange with significant minimization in the power consumption of each device.Comment: 6 pages, 8 figures, To appear in the proceedings of IEEE 14th International Conference on High Performance Computing and Communications (HPCC-2012) of the Third International Workshop on Wireless Networks and Multimedia (WNM-2012), 25-27 June 2012, Liverpool, U

    SAI: safety application identifier algorithm at MAC layer for vehicular safety message dissemination over LTE VANET networks

    Get PDF
    Vehicular safety applications have much significance in preventing road accidents and fatalities. Among others, cellular networks have been under investigation for the procurement of these applications subject to stringent requirements for latency, transmission parameters, and successful delivery of messages. Earlier contributions have studied utilization of Long-Term Evolution (LTE) under single cell, Friis radio, or simplified higher layer. In this paper, we study the utilization of LTE under multicell and multipath fading environment and introduce the use of adaptive awareness range. Then, we propose an algorithm that uses the concept of quality of service (QoS) class identifiers (QCIs) along with dynamic adaptive awareness range. Furthermore, we investigate the impact of background traffic on the proposed algorithm. Finally, we utilize medium access control (MAC) layer elements in order to fulfill vehicular application requirements through extensive system-level simulations. The results show that, by using an awareness range of up to 250 m, the LTE system is capable of fulfilling the safety application requirements for up to 10 beacons/s with 150 vehicles in an area of 2 × 2 km2. The urban vehicular radio environment has a significant impact and decreases the probability for end-to-end delay to be ≤100 ms from 93%–97% to 76%–78% compared to the Friis radio environment. The proposed algorithm reduces the amount of vehicular application traffic from 21 Mbps to 13 Mbps, while improving the probability of end-to-end delay being ≤100 ms by 20%. Lastly, use of MAC layer control elements brings the processing of messages towards the edge of network increasing capacity of the system by about 50%
    • …
    corecore