Dandelion-Encoded Harmony Search Heuristics for Opportunistic Traffic Offloading in Synthetically Modeled Mobile Networks

Loading...
Thumbnail Image
Identifiers
Publication date
2016
Advisors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Berlin Heidelberg
Citations
Google Scholar
Export
Research Projects
Organizational Units
Journal Issue
Abstract
The high data volumes being managed by and transferred through mobile networks in the last few years are the main rationale for the upsurge of research aimed at finding efficient technical means to offload exceeding traffic to alternative communication infrastructures with higher transmission bandwidths. This idea is solidly buttressed by the proliferation of short-range wireless communication technologies (e.g. mobile devices with multiple radio interfaces), which can be conceived as available opportunistic hotspots to which the operator can reroute exceeding network traffic depending on the contractual clauses of the owner at hand. Furthermore, by offloading to such hotspots a higher effective coverage can be attained by those operators providing both mobile and fixed telecommunication services. In this context, the operator must decide if data generated by its users will be sent over conventional 4G+/4G/3G communication links, or if they will instead be offloaded to nearby opportunistic networks assuming a contractual cost penalty. Mathematically speaking, this problem can be formulated as a spanning tree optimization subject to cost-performance criteria and coverage constraints. This paper will elaborate on the efficient solving of this optimization paradigm by means of the Harmony Search meta-heuristic algorithm and the so-called Dandelion solution encoding, the latter allowing for the use of conventional meta-heuristic operators maximally preserving the locality of tree representations. The manuscript will discuss the obtained simulation results over different synthetically modeled setups of the underlying communication scenario and contractual clauses of the users.
Description
Citation
Springer Advances in Intelligent Systems and Computing, Vol. 382 (2016), pp. 133-145