Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference papers

Energy Efficiency

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Improving Energy Efficiency In Open Ran Through Dynamic Cpu Scheduling, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma Dec 2023

Improving Energy Efficiency In Open Ran Through Dynamic Cpu Scheduling, Saish Urumkar, Byrav Ramamurthy, Sachin Sharma

Conference papers

Open RAN is a promising cellular technology that is currently undergoing extensive research for future wireless radio access networks. Achieving optimal energy efficiency in Open RAN poses a significant challenge. This paper introduces a CPU scheduling algorithm that specifically targets this chal- lenge by optimizing energy consumption at the base station while maintaining optimal performance levels. With the goal of minimizing energy consumption, the proposed algorithm dynamically adjusts the CPU core states, seamlessly switching between active and sleep modes based on the load conditions. To evaluate the algorithm’s effectiveness in terms of energy saving and performance, experimental testing is conducted …


Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell Dec 2018

Distance-Based Cluster Head Election For Mobile Sensing, Ruairí De Fréin, Liam O'Farrell

Conference papers

Energy-efficient, fair, stochastic leader-selection algorithms are designed for mobile sensing scenarios which adapt the sensing strategy depending on the mobile sensing topology. Methods for electing a cluster head are crucially important when optimizing the trade-off between the number of peer-to- peer interactions between mobiles and client-server interactions with a cloud-hosted application server. The battery-life of mobile devices is a crucial constraint facing application developers who are looking to use the convergence of mobile computing and cloud computing to perform environmental sensing. We exploit the mobile network topology, specifically the location of mobiles with respect to the gateway device, to stochastically …