317959 Mobile Opportunistic Traffic Offloading D3.3.1

Total Page:16

File Type:pdf, Size:1020Kb

317959 Mobile Opportunistic Traffic Offloading D3.3.1 Ref. Ares(2014)3639899 - 03/11/2014 317959 Mobile Opportunistic Traffic Offloading D3.3.1 – Design and evaluation of enabling techniques for mobile data traffic offloading (release a, public) D3.1 Design and evaluation of enabling techniques for mobile data traffic offloading (release a) WP3 – Offloading foundations and enablers © MOTO Consortium – 2014 D3.1 Design and evaluation of enabling techniques for mobile data traffic offloading (release a) WP3 – Offloading foundations and enablers Grant Agreement No. 317959 Project acronym MOTO Project title Mobile Opportunistic Traffic Offloading Advantage Deliverable number D3.3.1 Deliverable name Design and evaluation of enabling techniques for mobile data traffic offloading (release a) Version V 3.0 WorK pacKage WP3 – Offloading foundations and enablers Lead beneficiary CNR Authors Vania Conan (TCS), Filippo Rebecchi (TCS), Raffaele Bruno (CNR), Andrea Passarella (CNR), Elisabetta Biondi (CNR), Chiara Boldrini (CNR), Antonino Masaracchia (CNR), Giovanni Mainetto (CNR), Marcelo Dias de Amorim (UPMC), Filippo Rebecchi (UPMC), Engin Zeydan (AVEA), Ahmet Serdar Tan (AVEA), Eva Pierattelli (INTECS), Daniele Azzarelli (INTECS). Nature R – Report Dissemination level PU – Public Delivery date 31/10/2014 (M24) © MOTO Consortium – 2014 D3.1 Design and evaluation of enabling techniques for mobile data traffic offloading (release a) WP3 – Offloading foundations and enablers Table of Contents LIST OF FIGURES ........................................................................................................................................ 5 EXECUTIVE SUMMARY .............................................................................................................................. 7 1 INTRODUCTION ................................................................................................................................... 8 1.1 PROBLEM STATEMENT: OBJECTIVES OF THE WP AND APPROACH IN ADDRESSING THEM ........................................ 8 1.2 ENABLING TECHNIQUES FOR MOBILE DATA TRAFFIC OFFLOADING: A SUMMARY ................................................... 9 1.2.1 TasK 3.2: Capacity limits and improvements in networKs with offloading ................................... 9 1.2.2 TasK 3.3: Scheduling issues in networKs with offloading ........................................................... 11 1.2.3 Progress with respect to Y1 activities ........................................................................................ 12 1.3 WP3 ACTIVITIES IN THE OVERALL FRAMEWORK OF THE PROJECT ..................................................................... 12 2 CAPACITY ANALYSIS: ASSESSING CAPACITY OF OPPORTUNISTIC NETWORKS ..................................... 14 2.1 CONVERGENCE OF OPPORTUNISTIC NETWORKING PROTOCOLS ....................................................................... 14 2.1.1 Social-oblivious protocols .......................................................................................................... 16 2.1.2 Social-aware protocols ............................................................................................................... 17 2.1.2.1 Definition of social-aware forwarding protocols ................................................................ 17 2.1.2.2 Convergence conditions for social-aware protocols ........................................................... 17 2.1.3 Comparing social-oblivious and social-aware schemes ............................................................. 19 2.2 END-TO-END DELAY IN OPPORTUNISTIC NETWORKS IN PRESENCE OF DUTY CYCLING ............................................ 20 2.2.1 Optimal duty cycling settings ..................................................................................................... 20 3 CAPACITY ANALYSIS: ASSESSING CAPACITY OF LTE ............................................................................ 23 3.1 LTE MAC-LAYER THROUGHPUT ............................................................................................................... 24 3.1.1 LTE MAC Model .......................................................................................................................... 24 3.1.2 Throughput Analysis ................................................................................................................... 25 3.1.3 Validation ................................................................................................................................... 30 3.2 ROBUST AMC IN LTE USING REINFORCEMENT LEARNING ............................................................................. 31 3.2.1 Protocol design .......................................................................................................................... 32 3.2.2 Performance evaluation ............................................................................................................. 33 4 CAPACITY ANALYSIS: ASSESSING CAPACITY OF AN INTEGRATED OFFLOADED NETWORK ................... 35 4.1 OFFLOADING WITH BOTH OPPORTUNISTIC AND WI-FI NETWORKS ................................................................... 36 4.1.1 Mobility trace and AP position ................................................................................................... 36 4.1.2 Simulation setup and scenario ................................................................................................... 38 4.1.3 Opportunistic or AP-based offloading? ...................................................................................... 38 4.1.4 Energy savings and fairness ....................................................................................................... 40 4.2 OFFLOADING WITH NON-SYNCHRONISED CONTENT REQUESTS ........................................................................ 41 4.2.1 Offloading algorithms for non-synchronised requests ............................................................... 42 4.2.2 Evaluation when all users request the content .......................................................................... 43 4.2.3 Evaluation when all users request the content .......................................................................... 44 5 INTRA-TECHNOLOGY SCHEDULING: JOINT USE OF MULTICAST AND D2D IN CELLULAR NETWORKS ... 46 © MOTO Consortium – 2014 D3.1 Design and evaluation of enabling techniques for mobile data traffic offloading (release a) WP3 – Offloading foundations and enablers 5.1 MULTICAST IN 4G NETWORKS .................................................................................................................. 47 5.2 JOINT D2D / MULTICAST OFFLOADING ....................................................................................................... 48 5.3 PERFORMANCE EVALUATION .................................................................................................................... 48 6 INTRA-TECHNOLOGY SCHEDULING: TOWARDS ENERGY EFFICIENCY IN THE LTE NETWORK ................ 51 6.1 POWER CONSUMPTION MODEL ................................................................................................................ 51 6.2 SIMULATION SET-UP ............................................................................................................................... 52 6.2.1 Switch-off procedures ................................................................................................................ 53 6.2.2 Buildings Module ....................................................................................................................... 56 6.3 SIMULATION RESULTS ............................................................................................................................. 57 7 INTER-TECHNOLOGY SCHEDULING: MULTI-USER OFFLOADING IN HETEROGENEOUS WIRELESS NETWORK INFRASTRUCTURES ................................................................................................................. 60 7.1 TOPSIS-BASED SOLUTIONS IN THE CONTEXT OF ONGOING RESEARCH .............................................................. 60 7.2 PERFORMANCE METRıCS INFLUENCING DATA OFFLOADıNG AND SYSTEM MODEL .............................................. 61 7.3 MULTIUSER OFFLOADING ALGORITHMS FOR HETEROGENEOUS NETWORKS ....................................................... 63 7.3.1 TOPSIS ........................................................................................................................................ 63 7.3.2 Multiple attribute sets in TOPSIS algorithm ............................................................................... 65 7.3.3 Capacity aware multi-user iterative TOPSIS (CAT) algorithm ..................................................... 66 7.3.4 Standard TOPSIS (ST) method .................................................................................................... 67 7.4 PERFORMANCE RESULTS ......................................................................................................................... 67 7.4.1 Simulation Scenario .................................................................................................................... 67 7.4.2 Results ........................................................................................................................................ 68 7.5 USING TOPSIS WITH D2D TECHNOLOGY ................................................................................................... 69 8 OPEN ISSUES ....................................................................................................................................
Recommended publications
  • SON Functions for Multi-Layer LTE and Multi-RAT Networks
    INFSO-ICT-316384 SEMAFOUR D4.1 SON functions for multi-layer LTE and multi-RAT networks (first results) Contractual Date of Delivery to the EC: November 30th, 2013 Actual Date of Delivery to the EC: November 29th, 2013 Work Package WP4 Participants: NSN-D, EAB, iMinds, FT, TNO, TUBS, NSN-DK Authors Daniela Laselva, Zwi Altman, Irina Balan, Andreas Bergström, Relja Djapic, Hendrik Hoffmann, Ljupco Jorguseski, István Z. Kovács, Per Henrik Michaelsen, Dries Naudts, Pradeepa Ramachandra, Cinzia Sartori, Bart Sas, Kathleen Spaey, Kostas Trichias, Yu Wang Reviewers Thomas Kürner, Kristina Zetterberg Estimated Person Months: 53 Dissemination Level Public Nature Report Version 1.0 Total number of pages: 141 Abstract: Five promising SON functionalities for future multi-RAT and multi-layer networks have been identified within the SEMAFOUR project, namely, Dynamic Spectrum Allocation and Interference Management, multi-layer LTE / Wi-Fi Traffic Steering (TS), Idle Mode mobility Handling, tackling the problem of High Mobility users and Active/reconfigurable Antenna Systems. This document covers the detailed description of the SON features, the Controllability and Observability analysis as well as initial directions of the SON design for the above-mentioned five use cases. Furthermore, initial performance evaluation in the realistic “Hannover scenario” is provided for the proposed TS SON algorithms. Keywords: Self-management, Self-optimization, SON, Multi-layer, Multi-RAT, Spectrum Allocation, Traffic steering, High Mobility, Active Antenna, Controllability and Observability SEMAFOUR (316384) D4.1 SON functions (first results) Executive Summary Self-management and self-optimization will play critical roles in the future evolution of wireless networks. The complexity of future multi-layer / RAT technologies and the pressure to be competitive, e.g.
    [Show full text]
  • A Techno-Economic Comparison Between Outdoor Macro-Cellular and Indoor Offloading Solutions
    A techno-economic comparison between outdoor macro-cellular and indoor offloading solutions FEIDIAS MOULIANITAKIS Master's Degree Project Stockholm, Sweden August 2015 TRITA-ICT-EX-2015:224 A techno-economic comparison between outdoor macro-cellular and indoor offloading solutions Feidias Moulianitakis 2015-08-31 Master’s Thesis Examiner Academic adviser Prof. Jan Markendahl Ashraf A. Widaa Ahmed School of Information and Communication Technology (ICT) KTH Royal Institute of Technology Stockholm, Sweden Abstract Mobile penetration rates have already exceeded 100% in many countries. Nowadays, mobile phones are part of our daily lives not only for voice or short text messages but for a plethora of multimedia services they provide via their internet connection. Thus, mobile broadband has become the main driver for the evolution of mobile networks and it is estimated that until 2018 the mobile broadband traffic will exceed the level of 15 exabytes. This estimation is a threat to the current mobile networks which have to significantly improve their capacity performance. Furthermore, another important aspect is the fact that 80% of the mobile broadband demand comes from indoor environments which add to the signal propagation the burden of building penetration loss. Keeping these facts in mind, there are many potential solutions that can solve the problem of the increasing indoor mobile broadband demand. In general, there are two approaches; improve the existing macro-cellular networks by for example enhancing them with carrier aggregation or enter the buildings and deploy small cell solutions such as femtocells or WiFi APs. Both the academia and the industry have already shown interest in these two approaches demonstrating the importance of the problem.
    [Show full text]
  • Mobile Data Offloading – Challenges and Solution
    International Journal of Control and Automation Vol. 12, No. 04, (2019), pp. 221-228 Mobile Data Offloading – Challenges and Solution 1 2 3 4 Aradhana , Dr. Samarendra Mohan Ghosh , Sudha Tiwari , Smita Suresh Daniel 1Research Scholar in Dr. C.V. Raman University Bilaspur, 2Professor in Dr. C.V. Raman University Bilaspur, 3Assistant Prof. in Rungta College of Engineering and Technology Bhilai, 4 Assistant Professor in Sat. Thomas College Bhilai. Abstract Mobile cloud computing is emerging at the rapid rate with evolutions in IT industries but various challenges are also coming up during data and task migration from mobile devices to cloud. Major issue confronted by mobile cloud computing is security of data during offloading It requires awareness of growing security threats associated with data offloading and strategic planning to resolve the issue. In this paper, we bring out various security issues subjected to mobile data offloading and challenges during computational data offloading on clouds. By virtue of our study on mobile cloud computing and its related threats and the avenues to tackle these issues we developed an agent based framework for data offloading in a secure and energy efficient manner. Using this proposed framework we can enhance the level of security and use this as a tool to address many security issues arising during computational data offloading from mobile to cloud. Keywords: Code Obfuscation, Encryption, Computation Offloading, IaaS, PaaS, SaaS. 1. Introduction Mobile Cloud Computing is a phenomena of migrating the computational process to server that executes some events or application on behalf of the user mobile, but it may suffer many security challenges like authentication, code integrity, access control, availability, anti- tempering and trust management.
    [Show full text]
  • Performance Analysis of Mobile Data Offloading in Heterogeneous
    1 Performance Analysis of Mobile Data Offloading in Heterogeneous Networks Fidan Mehmeti, Student Member, IEEE, and Thrasyvoulos Spyropoulos, Member, IEEE Abstract—An unprecedented increase in the mobile data traffic volume has been recently reported due to the extensive use of smartphones, tablets and laptops. This is a major concern for mobile network operators, who are forced to often operate very close to (or even beyond) their capacity limits. Recently, different solutions have been proposed to overcome this problem. The deployment of additional infrastructure, the use of more advanced technologies (LTE), or offloading some traffic through Femtocells and WiFi are some of the solutions. Out of these, WiFi presents some key advantages such as its already widespread deployment and low cost. While benefits to operators have already been documented, it is less clear how much and under what conditions the user gains as well. Additionally, the increasingly heterogeneous deployment of cellular networks (partial 4G coverage, small cells, etc.) further complicates the picture regarding both operator- and user-related performance of data offloading. To this end, in this paper we propose a queueing analytic model that can be used to understand the performance improvements achievable by WiFi-based data offloading, as a function of WiFi availability and performance, user mobility and traffic load, and the coverage ratio and respective rates of different cellular technologies available. We validate our theory against simulations for realistic scenarios and parameters, and provide some initial insights as to the offloading gains expected in practice. Index Terms—Mobile data offloading, Queueing theory, Probability generating functions, HetNets. ✦ 1 INTRODUCTION ATELY, an enormous growth in the mobile data traffic A more cost-effective way of alleviating the problem of L has been reported.
    [Show full text]
  • On Practical Aspects of Mobile Data Offloading to Wi-Fi Networks
    On Practical Aspects of Mobile Data Offloading to Wi-Fi Networks Adnan Aijaz †, Nazir Uddin ‡, Oliver Holland †, and A. Hamid Aghvami † †Centre for Telecommunications Research, King’s College London, London WC2R 2LS, UK ‡Nokia Siemens Networks, Indonesia {adnan.aijaz, oliver.holland, hamid.aghvami}@kcl.ac.uk, [email protected] Abstract Data traffic over cellular networks is exhibiting an ongoing exponential growth, increasing by an order of magnitude every year and has already surpassed voice traffic. This increase in data traffic demand has led to a need for solutions to enhance capacity provision, whereby traffic offloading to Wi-Fi is one means that can enhance realised capacity. Though offloading to Wi-Fi networks has matured over the years, a number of challenges are still being faced by operators to its realization. In this article, we carry out a survey of the practical challenges faced by operators in data traffic offloading to Wi-Fi networks. We also provide recommendations to successfully address these challenges. Index Terms – mobile data offloading, Wi-Fi offloading, DAS, backhaul, 802.11u I. INTRODUCTION In recent years, data traffic transmitted over cellular/mobile networks has seen a continuous exponential growth increasing by an order of magnitude every year. According to Cisco forecasts [1], global mobile data traffic is expected to grow to 15.9 exabytes (1 exa = 10 18 ) per month by 2018, which is an 11-fold increase over 2013. This unprecedented growth of data traffic can be attributed to a number of factors. A first factor is the introduction of high- end devices such as smartphones, tablets, laptops, handheld gaming consoles, etc.
    [Show full text]
  • Traffic Offloading Through Wi-Fi Networks
    International Journal of Computer Applications (0975 – 8887) Volume 178 – No. 21, June 2019 Traffic Offloading through Wi-Fi Networks Kritika Kapoor Assitant Professor Tramiet, Mandi ABSTRACT Cell systems are as of now confronting movement over- burden issue because of extreme developing interest of advanced mobile phones, tablets and portable PCs. The after effect of which top of the line gadgets twofold their information movement consistently and this pattern is relied upon to proceed with given the fast advancement of versatile social applications. This expansion in information movement is gauge to quicken and after effect of which they brought on a prompt requirement for offloading activity for ideal execution of both voice and information administrations. Subsequently, extraordinary inventive arrangements have risen to oversee information movement. A financially savvy and one of sensible arrangement is to offload cell movement through Wi-Fi, Femtocells or Delay Tolerant System (DTN) Figure 1: Global Mobile Data Traffic [1] to decrease the weight on the cell organizes and furthermore increment the quality of service (QoS). Wi-Fi offloading is a To handle this problem of explosive traffic demands growth procedure for tending to the portable information blast issue. and limited capacity of network there is urgent need to Offloading portable information activity through pioneering provide some better solution to reduce the traffic in the correspondences is answering for tackle this issue. The network. Various solutions has been provided to overcome thought is that the specialist organizations convey data over this traffic like installing new base stations (BS’s), increase cell systems to just clients in the objective set.
    [Show full text]
  • Spatiotemporal Characterization of Contact Patterns in Dynamic Networks
    Ref. Ares(2014)1430495 - 05/05/2014 Mobile Opportunistic Traffic Offloading (MOTO) D3.2: Spatiotemporal characterization of contact patterns in dynamic networks Document information Edition 13 Date 29/04/2014 Status Edition Editor UPMC Contributors UPMC, TCS, CNR, INNO D3.2 Spatiotemporal characterization of contact patterns in dynamic networks Contents 1 Executive summary 4 2 Introduction 4 3 Contact patterns under a unifying framework 5 3.1 The SPoT Mobility Framework . .5 3.1.1 The social and spatial dimensions of human mobility . .6 3.1.2 From meeting places to geographical locations . .7 3.1.3 The temporal dimension of user visits to meeting places . .8 3.2 Analysis of real user movements . .9 3.3 Testing the framework flexibility . 10 3.4 Testing the framework controllability . 10 3.4.1 Validation . 11 3.5 Final remarks . 12 4 Impact of duty cycling on contact patterns 13 4.1 Problem statement . 13 4.2 The case of exponential intercontact times . 14 4.2.1 Computing N ....................................... 14 4.2.2 Computing the detected intercontact times . 15 4.2.3 Validation . 15 4.3 The effect of duty cycling on the delay . 17 4.4 Energy, traffic, and network lifetime . 17 4.5 Final remarks . 20 5 Contacts and intercontacts beyond one hop 20 5.1 Defining a new vicinity for opportunistic networks . 21 5.2 The limits of the binary assertion . 23 5.2.1 Datasets . 23 5.2.2 Binary assertion illustration . 25 5.2.3 Missed transmission possibilities . 25 5.3 κ-vicinity analysis . 26 5.3.1 The seat of κ-vicinities: connected components .
    [Show full text]
  • Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users
    Hindawi Wireless Communications and Mobile Computing Volume 2018, Article ID 2608419, 13 pages https://doi.org/10.1155/2018/2608419 Research Article Data Traffic Offload from Mobile to Wi-Fi Networks: Behavioural Patterns of Smartphone Users Siniša Husnjak , Dragan PerakoviT , and Ivan Forenbacher Faculty of Transport and Trafc Sciences, University of Zagreb, Vukeli´ceva 4, 10000 Zagreb, Croatia Correspondence should be addressed to Siniˇsa Husnjak; [email protected] Received 11 August 2017; Revised 14 January 2018; Accepted 12 February 2018; Published 25 March 2018 Academic Editor: Michael McGuire Copyright © 2018 Siniˇsa Husnjak et al. Tis is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Tis paper presents a model for defning the behavioural patterns of smartphone users when ofoading data from mobile to Wi-Fi networks. Te model was generated through analysis of individual characteristics of 298 smartphone users, based on data collected via online survey as well as the amount of data ofoaded from mobile to Wi-Fi networks as measured by an application integrated into the smartphone. Users were segmented into categories based on data volume ofoaded from mobile to Wi-Fi networks, and numerous user characteristics were explored to develop a model capable of predicting the probability that a user with given characteristics will fall into a given category of data ofoading. Tis model may prove useful for analysing smartphone user behaviour when ofoading data. 1. Introduction [5] concludes that the amount of smartphone-based data trafc ofoading to Wi-Fi networks will be 56% of total data Te number of smartphone subscription connections at trafc by the year 2020, and studies have claimed that 65% the global level has reached 3 billion, and in the last fve [14] or more than 70% [15] of smartphone data trafc is being years, data trafc has increased more than 40-fold [1–4].
    [Show full text]
  • Design and Analysis of Optimal Threshold Offloading Algorithm For
    1 Design and Analysis of Optimal Threshold Offloading Algorithm for LTE Femtocell/Macrocell Networks Wei-Han Chen, Yi Ren, Chia-Wei Chang, and Jyh-Cheng Chen, Fellow, IEEE Abstract LTE femtocells have been commonly deployed by network operators to increase network capacity and offload mobile data traffic from macrocells. A User Equipment (UE) camped on femtocells has the benefits of higher transmission rate and longer battery life due to its proximity to the base stations. However, various user mobility behaviors may incur network signaling overhead and degrade femto- cell offloading capability. To efficiently offload mobile data traffic, we propose an optimal Threshold Offloading (TO) algorithm considering the trade-off between network signaling overhead and femtocell offloading capability. In this paper, we develop an analytical model to quantify the trade-off and validate the analysis through extensive simulations. The results show that the TO algorithm can significantly reduce signaling overhead at minor cost of femtocell offloading capability. Moreover, this work offers network operators guidelines to set optimal offloading threshold in accordance with their management policies in a systematical way. Keywords LTE, Offloading, Femtocell, Performance Analysis arXiv:1605.01126v3 [cs.NI] 13 Jul 2016 I. INTRODUCTION The Long Term Evolution-Advanced (LTE-A) [1] standardized by the 3rd Generation Partner- ship Project (3GPP) provides high speed wireless data transmission services: up to 100 Mbit/s peak data rates for high mobility access and 1 Gbit/s for low mobility users. LTE-A together with The authors are with the Department of Computer Science, National Chiao Tung University, Hsinchu 300, Taiwan (E-mail: fwhchen, yiren, chwchang, [email protected]) 2 ubiquitous Internet access offered by various mobile devices leads to explosive growth of mobile data traffic in the past few years.
    [Show full text]
  • Game Theory-Based Smart Mobile-Data Offloading Scheme In
    applied sciences Article Game Theory-Based Smart Mobile-Data Offloading Scheme in 5G Cellular Networks Huynh Thanh Thien 1 , Van-Hiep Vu 2 and Insoo Koo 1,* 1 School of Electrical Engineering, University of Ulsan, Ulsan 44610, Korea; [email protected] 2 NTT Hi-Tech Institute, Nguyen Tat Thanh University, Ho Chi Minh City 70000, Vietnam; [email protected] * Correspondence: [email protected]; Tel.: +82-52-259-1249 Received: 28 February 2020; Accepted: 24 March 2020; Published: 29 March 2020 Abstract: Mobile-data traffic exponentially increases day by day due to the rapid development of smart devices and mobile internet services. Thus, the cellular network suffers from various problems, like traffic congestion and load imbalance, which might decrease end-user quality of service. This work compensates for the problem of offloading in the cellular network by forming device-to-device (D2D) links. A game scenario is formulated where D2D-link pairs compete for network resources. In a D2D-link pair, the data of a user equipment (UE) is offloaded to another UE with an offload coefficient, i.e., the proportion of requested data that can be delivered via D2D links. Each link acts as a player in a cooperative game, with the optimal solution for the game found using the Nash bargaining solution (NBS). The proposed solution aims to present a strategy to control different parameters of the UE, including harvested energy which is stored in a rechargeable battery with a finite capacity and the offload coefficients of the D2D-link pairs, to optimize the performance of the network in terms of throughput and energy efficiency (EE) while considering fairness among links in the network.
    [Show full text]
  • CAN Mosonets OFFLOAD DATA SOLVE THIS
    IJCSI International Journal of Computer Science Issues, Vol. 10, Issue 3, No 2, May 2013 ISSN (Print): 1694-0814 | ISSN (Online): 1694-0784 www.IJCSI.org 96 CAPACITY CRUNCH: CAN MoSoNets OFFLOAD DATA SOLVE THIS Usha R 1, Annapurna P Patil2 1P.G Student, Department of computer science, MSRIT, Bangalore-560054, Karnataka, India. 2Associate Professor, Department of Computer science, MSRIT, Bangalore-560054, Karnataka, India. Abstract: 1. INTRODUCTION: Due to the increasing popularity of various applications for There is no doubt that the volumes of mobile smart phones, 3G cellular networks are currently overloaded communication is exploding beyond anyone’s by mobile data traffic. Offloading mobile cellular network imagination and this is compounded by the widespread traffic through opportunistic communications is a promising solution to partially solve mobile data traffic, because there is use of smart phones using novel platforms of Google’s no monetary cost for it. To solve this problem we propose android, apple’s ios and windows mobile platform target-set selection problem for information delivery in the virtually allowing them to take over almost all the emerging Mobile Social Networks (MoSoNets). We propose functions of a computer for the average user. to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of The service providers are being overwhelmed by the cellular traffic. Here, with only k mobile users we study how sheer volumes of data that these phones generate and in to select the target set, such that we can minimize the cellular a populous country like India where the bandwidth are mobile data traffic.
    [Show full text]
  • Mobile Data Traffic Offloading Over Passpoint Hotspots
    Computer Networks 84 (2015) 76–93 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet Mobile data traffic offloading over Passpoint hotspots ✩ Sahar Hoteit a,∗, Stefano Secci b, Guy Pujolle b, Adam Wolisz c, Cezary Ziemlicki d, Zbigniew Smoreda d a Laboratoire des Signaux et Systèmes (L2S, UMR CNRS 8506), CNRS - CentraleSupélec - Université Paris-Sud, 3, rue Joliot Curie, 91192, Gif-sur-Yvette b Sorbonne Universités, UPMC Universités Paris 06, UMR 7606, LIP6, Paris, F-75005, France c Technical University Berlin, Berlin 10587, Germany d Orange Labs, 92794 Issy les Moulineaux, France article info abstract Article history: Wi-Fi technology has always been an attractive solution for catering the increasing data de- Received 22 August 2014 mand in mobile networks because of the availability of Wi-Fi networks, the high bit rates they Revised 3 April 2015 provide, and the lower cost of ownership. However, the legacy WiFi technology lacks of seam- Accepted 17 April 2015 less interworking between Wi-Fi and mobile cellular networks on the one hand, and between Available online 30 April 2015 Wi-Fi hotspots on the other hand. Nowadays, the recently released Wi-Fi Certified Passpoint Program provides the necessary control-plane for these operations. Service providers can Keywords: henceforth look to such Wi-Fi systems as a viable way to seamlessly offload mobile traffic and Mobile data traffic Passpoint deliver added-value services, so that subscribers no longer face the frustration and aggrava- Traffic offloading tion of connecting to Wi-Fi hotspots. However, the technology being rather recent, we are not aware of public studies at the state of the art documenting the achievable gain in real mobile networks.
    [Show full text]