11 research outputs found

    Comparison studies of MANET-satellite and MANET-cellular networks integrations

    Get PDF
    A mobile ad hoc network (MANET) is a self-configuring infrastructure-less network. Taking advantage of spontaneous and infrastructure-less behavior, MANET can be integrated with satellite network to provide world-wide communication for emergency and disaster relieve services and can also be integrated with cellular network for mobile data offloading. To achieve different purposes, different architecture of integrated system, protocols and mechanisms are designed. For emergency services, ubiquitous and robust communications are of paramount importance. For mobile data offloading services, emphasis is amount of offloaded data, limited storage and energy of mobile devices. It is important to study the common features and distinguish of the architecture and service considerations for further research in the two integrated systems. In this paper, we study common issues and distinguish between two systems in terms of routing protocol, QoS provision, energy efficiency, privacy protection and resource management. The future research can benefit from taking advantage of the similarity of two systems and address the relevant issues

    Flooding Data in a Cell: Is Cellular Multicast Better than Device-to-Device Communications?

    Get PDF
    International audienceA natural method to disseminate popular data on cellular networks is to use multicast. Despite having clear advantages over unicast, multicast does not offer any kind of reliability and could result costly in terms of cellular resources in the case at least one of the destinations is at the edge of the cell (i.e., with poor radio conditions). In this paper, we show that, when content dissemination tolerates some delay, providing device-to-device communications over an orthogonal channel increases the efficiency of multicast, concurring also to offload part of the traffic from the infrastructure. Our evaluation simulates an LTE macro-cell with mobile receivers and reveals that the joint utilization of device-to-device communications and multicasting brings significant resource savings while increasing the cellular throughput

    Content-centric wireless networks with limited buffers: when mobility hurts

    Get PDF
    We analyze throughputโ€“delay scaling laws of mobile ad hoc networks under a content-centric traffic scenario, where users are mainly interested in retrieving contents cached by other nodes. We assume limited buffer size available at each node and Zipf-like content popularity. We consider nodes uniformly visiting the network area according to a random-walk mobility model, whose flight size varies from the typical distance among the nodes (quasi-static case) up to the edge length of the network area (reshuffling mobility model). Our main findings are: 1) the best throughputโ€“delay tradeoffs are achieved in the quasi-static case: increasing the mobility degree of nodes leads to worse and worse performance; ii) the best throughputโ€“delay tradeoffs can be recovered by power control (i.e., by adapting the transmission range to the content) even in the complete reshuffling case

    DROiD: Adapting to Individual Mobility Pays Off in Mobile Data Offloading

    Get PDF
    International audienceCellular operators count on the potentials of offloading techniques to relieve their overloaded data channels. Beyond standard access point-based offloading strategies, a promising alternative is to exploit opportunistic direct communication links between mobile devices. Nevertheless, achieving efficient device- to-device offloading is challenging, as communication opportunities are, by nature, dependent on individual mobility patterns. We propose, design, and evaluate DROiD (Derivative Reinjection to Offload Data), an original method to finely control the distribution of popular contents throughout a mobile network. The idea is to use the infrastructure resources as seldom as possible. To this end, DROiD injects copies through the infrastructure only when needed: (i) at the beginning, in order to trigger the dissemination, (ii) if the evolution of the opportunistic dissemination is below some expected pace, and (iii) when the delivery delay is about to expire, in order to guarantee 100% diffusion. Our strategy is particularly effective in highly dynamic scenarios, where sudden creation and dissolution of clusters of mobile nodes prevent contents to diffuse properly.We assess the performance of DROiD by simulating a traffic information service on a realistic large-scale vehicular dataset composed of more than 10,000 nodes. DROiD substantially outperforms other offloading strategies, saving more than 50% of the infrastructure traffic even in the case of tight delivery delay constraints. DROiD allows terminal- to-terminal offloading of data with very short maximum reception delay, in the order of minutes, which is a realistic bound for cellular user acceptance

    A New Competitive Ratio for Network Applications with Hard Performance Guarantee

    Get PDF
    Online algorithms are used to solve the problems which need to make decisions without future knowledge. Competitive ratio is used to evaluate the performance of an online algorithm. This ratio is the worst-case ratio between the performance of the online algorithm and the offline optimal algorithm. However, the competitive ratios in many current studies are relatively low and thus cannot satisfy the need of the customers in practical applications. To provide a better service, a practice for service provider is to add more redundancy to the system. Thus we have a new problem which is to quantify the relation between the amount of increased redundancy and the system performance. In this dissertation, to address the problem that the competitive ratio is not satisfactory, we ask the question: How much redundancy should be increased to fulfill certain performance guarantee? Based on this question, we will define a new competitive ratio showing the relation between the system redundancy and performance of online algorithm compared to offline algorithm. We will study three applications in network applications. We propose online algorithms to solve the problems and study the competitive ratio. To evaluate the performances, we further study the optimal online algorithms and some other commonly used algorithms as comparison. We first study the application of online scheduling for delay-constrained mobile offloading. WiFi offloading, where mobile users opportunistically obtain data through WiFi rather than through cellular networks, is a promising technique to greatly improve spectrum efficiency and reduce cellular network congestion. We consider a system where the service provider deploys multiple WiFi hotspots to offload mobile traffic with unpredictable mobile usersโ€™ movements. Then we study online job allocation with hard allocation ratio requirement. We consider that jobs of various types arrive in some unpredictable pattern and the system is required to allocate a certain ratio of jobs. We then aim to find the minimum capacity needed to meet a given allocation ratio requirement. Third, we study online routing in multi-hop network with end-to-end deadline. We propose reliable online algorithms to schedule packets with unpredictable arriving information and stringent end-to-end deadline in the network

    ๋ชจ๋ฐ”์ผ ์†Œ์…œ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ๊ธฐํšŒ์ ์ธ ๊ณต์œ ๊ธฐ๋ฐ˜ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2013. 8. ์ตœ์–‘ํฌ.์ตœ๊ทผ ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ์˜ ๋น ๋ฅธ ์ฆ๊ฐ€๋Š” ์ด๋™ํ†ต์‹  ์‚ฌ์—…์ž์—๊ฒŒ ์‹ฌ๊ฐํ•œ ๋ฌธ์ œ๊ฐ€ ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฌธ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ๋‹จ๊ฑฐ๋ฆฌ ํ†ต์‹  ๊ธฐ์ˆ  ๋ฐ ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ ๋“ฑ์„ ์ด์šฉํ•˜์—ฌ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ๋ฐ์ดํ„ฐ๋ฅผ ์ฃผ๊ณ  ๋ฐ›๋Š” ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜๋Š” ๊ฒƒ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๊ฐ€ ์ด๋ฃจ์–ด์ง€๊ณ  ์žˆ๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ํ†ต์‹ ์„ ํ†ตํ•œ ํšจ์œจ์ ์ธ ์ฝ˜ํ…์ธ  ๊ณต์œ  ๋ฐ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•˜๊ณ ์ž ํ•œ๋‹ค. ์ฒซ๋ฒˆ์งธ ์—ฐ๊ตฌ๋กœ, ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก๊ธฐํšŒ๋ฅผ ํ™œ์šฉํ•ด ๋ฐ์ดํ„ฐ๋ฅผ ๊ณต์œ ํ•˜๋Š” ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ์˜ ํ•ต์‹ฌ ๊ธฐ์ˆ ์ธ TOSS๋ฅผ ์ œ์•ˆ ํ•˜์˜€๋‹ค. TOSS์—์„œ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ์—์„œ ๊ธ‰์†ํžˆ ์ฆ๊ฐ€ํ•˜๊ณ  ์žˆ๋Š” ํŠธ๋ž˜ํ”ฝ์œผ๋กœ ์ธํ•œ ๋„คํŠธ์›Œํฌ ๊ณผ๋ถ€ํ•˜๋ฅผ ๊ฒฝ๊ฐ์‹œํ‚ค๊ธฐ ์œ„ํ•ด ์˜จ๋ผ์ธ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์—ฐ๊ฒฐ์„ฑ ๋ฐ ์˜คํ”„๋ผ์ธ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž์˜ ์ด๋™์„ฑ์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ์ „๋‹ฌํ•  ์‚ฌ์šฉ์ž๋ฅผ ๊ฒฐ์ •ํ•˜๊ณ  ๋ธ”๋ฃจํˆฌ์Šค๋‚˜ ์™€์ดํŒŒ์ด ๋‹ค์ด๋ ‰ํŠธ ๋“ฑ์˜ ๊ธฐ์ˆ ์„ ์ด์šฉํ•ด ์ฝ˜ํ…์ธ ๋ฅผ ์ง์ ‘ ์ „๋‹ฌ ํ•˜์˜€๋‹ค. ๋˜ํ•œ ์†Œ์…œ๋„คํŠธ์›Œํฌ ์„œ๋น„์Šค ์‚ฌ์šฉ์ž์˜ ์„œ๋กœ ๋‹ค๋ฅธ ์ฝ˜ํ…์ธ  ์ ‘๊ทผ ํŒจํ„ด, ์ฆ‰ ๊ฐ ์‚ฌ์šฉ์ž๊ฐ€ ์ฝ˜ํ…์ธ  ์ƒ์„ฑ์œผ๋กœ๋ถ€ํ„ฐ ์˜คํ”„๋กœ๋”ฉ์„ ์œ„ํ•ด ์ฝ˜ํ…์ธ ์— ์ ‘๊ทผํ•˜๊ธฐ๊นŒ์ง€์˜ ์‹œ๊ฐ„์„ ๊ณ ๋ ค ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ด๋Ÿฌํ•œ ์š”๊ฑด์„ ๊ณ ๋ คํ•˜์—ฌ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ๊ณผ ์ฝ˜ํ…์ธ  ํ™•์‚ฐ์„ ๋ชจ๋ธ๋งํ•˜๊ณ  ๋ถ„์„ ํ•˜์˜€๋‹ค. ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์˜ ๋ฐ์ดํƒ€ ์…‹์„ ๊ธฐ๋ฐ˜์œผ๋กœ ๋ถ„์„ ๊ฒฐ๊ณผ์—์„œ TOSS๋Š” ๋ชจ๋“  ์‚ฌ์šฉ์ž์˜ ๋”œ๋ ˆ์ด ์š”๊ตฌ์กฐ๊ฑด์„ ๋งŒ์กฑ์‹œํ‚ค๋ฉด์„œ ์ตœ๋Œ€ 86.5์˜ ์…€๋ฃฐ๋Ÿฌ ํŠธ๋ž˜ํ”ฝ์„ ๊ฒฝ๊ฐ์‹œํ‚ค๋Š” ๊ฒƒ์„ ๋ณด์˜€๋‹ค. ๋‘๋ฒˆ์งธ์˜ ์—ฐ๊ตฌ์—์„œ๋Š” ๋ชจ๋ฐ”์ผ ๋„คํŠธ์›Œํฌ์—์„œ ๋ฉ€ํ‹ฐ์…€์„ ๊ณ ๋ คํ•˜์—ฌ ์ฝ˜ํ…์ธ ๋ฅผ ๋ฐฐํฌํ•˜๋Š” ํ”„๋ ˆ์ž„์›Œํฌ์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ์ง„ํ–‰ ํ•˜์˜€๋‹ค. ํ•ด๋‹น ํ”„๋ ˆ์ž„์›Œํฌ์—์„œ ์ฝ˜ํ…์ธ ๋Š” ์…€๋ฃฐ๋Ÿฌ ๋งํฌ์™€ ๋ชจ๋ฐ”์ผ ์‚ฌ์šฉ์ž๊ฐ„ ๋กœ์ปฌ ๋งํฌ๋ฅผ ํ†ตํ•ด ํ‘ธ์‹œ-๊ณต์œ  ๊ธฐ๋ฐ˜์˜ ํ†ต์‹ ์œผ๋กœ ์ „๋‹ฌ ๋˜์˜€๋‹ค. ์ด๋Ÿฌํ•œ ๊ธฐ๋ฒ•์„ ๋ฐ”ํƒ•์œผ๋กœ multi-compartment ๋ชจ๋ธ์„ ์ด์šฉํ•˜์—ฌ ์…€ ๊ฐ„ ํ•ธ๋“œ์˜ค๋ฒ„ ๋ฐ ์ฝ˜ํ…์ธ  ์ „๋‹ฌ์„ ๋ชจ๋ธ๋ง ๋ฐ ๋ถ„์„ํ•˜๊ณ , ์ฝ˜ํ…์ธ  ์ „๋‹ฌ ๋”œ๋ ˆ์ด์™€ ์—๋„ˆ์ง€ ์†Œ๋ชจ ์‚ฌ์ด์˜ trade-off๋ฅผ ์ˆ˜ํ•™์ ์ธ ์ตœ์ ํ™” ๊ธฐ๋ฒ•์„ ์‚ฌ์šฉํ•˜์—ฌ ํ•ด๊ฒฐ ํ•˜์˜€๋‹ค. ๋ณธ ๋…ผ๋ฌธ์—์„œ๋Š” ์ด์™€ ๊ฐ™์ด ๊ธฐ์กด์˜ ์ธก์ • ์—ฐ๊ตฌ์— ๊ธฐ๋ฐ˜ํ•œ trace-driven ๋ถ„์„, ๋ชจ๋ธ๋ง ๋ฐ ์‹œ์Šคํ…œ ์ตœ์ ํ™”์— ๋Œ€ํ•œ ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋ชจ๋ฐ”์ผ ์†Œ์…œ ๋„คํŠธ์›Œํฌ์—์„œ ์‚ฌ์šฉ์ž๊ฐ„ ์ง์ ‘ ์ „์†ก์„ ํ†ตํ•œ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์ด ๊ณ ํšจ์œจ์ ์ž„์„ ๋ณด์˜€๋‹ค. ๋˜ํ•œ ๋ณธ ๋…ผ๋ฌธ์€ ์ œ์•ˆ๋œ ๊ธฐ๋ฒ•์˜ ์ƒ์šฉํ™” ์ „๋ง ๋ฐ ์ด๋ฅผ ์œ„ํ•œ ์ด์Šˆ๋“ค์— ๋Œ€ํ•œ ๋…ผ์˜๋„ ํฌํ•จ ํ•˜์˜€๋‹ค.The fast increasing traffic demand becomes a serious concern of mobile network operators. To solve this traffic explosion problem, there have been efforts to offload the traffic from cellular links to local short-range communications among mobile users that are moving around and forming mobile social networks. In my thesis, I mainly focus on the user-to-user opportunistic sharing and try to elaborate its effectiveness and efficiency for to offload mobile traffic. In the first work, I propose the Traffic Offloading assisted by Social network services via opportunistic Sharing in mobile social networks, TOSS. In TOSS, initially a subset of mobile users are selected as initial seeds depending on their content spreading impact in online social network services (SNSs) and their mobility patterns in offline mobile social networks (MSNs). Then users share the content via opportunistic local connectivity (e.g., Bluetooth, Wi-Fi Direct) with each other. Due to the distinct access patterns of individual SNS users, TOSS further exploits the user-dependent access delay between the content generation time and each user's access time for the purpose of traffic offloading. I model and analyze process of the traffic offloading and content spreading by taking into account various options in linking SNS and MSN data sets. The trace-driven evaluation shows that TOSS can reduce up to 86.5% of the cellular traffic while satisfying the access delay requirements of all users. In the second work, I focus on the analytical research on Push-Share framework for content disseminating in mobile networks. One content is firstly pushed the to a subset of subscribers via cellular links, and mobile users spread the content via opportunistic local connectivity. I theoretically model and analyze how the content can be disseminated, where handovers are modeled based on the multi-compartment model. I also formulate the mathematical optimization framework, by which the trade-off between the dissemination delay and the energy cost is explored. Based on the measurement study, trace-driven analysis, theoretical modeling and system optimization in above papers, the traffic offloading by user-to-user opportunistic sharing in mobile social networks is proved to be effective and efficient. Additionally, further discussions on the practical deployment, future vision, and open issues are discussed as well.Abstract i I. Introduction 1 II. RelatedWork 7 2.1 Opportunistic Sharing in DTNs/MSNs 7 2.2 Mobile Traffic Offloading 9 2.3 Information/Content Spreading in SNSs 10 III. TOSS 13 3.1 Framework Details 13 3.1.1 Preliminaries 13 3.1.2 Spreading Impact in the Online SNS 16 3.1.3 Access Delays of Users in the SNS 18 3.1.4 Mobility Impact in the Offline MSN 21 3.2 System Optimization 25 3.3 Trace-Driven Measurement 26 3.3.1 Measurement of the Online SNS 26 3.3.2 Measurement of Offline MSNs, ฮปi j and IM 33 3.3.3 Content Obtaining Delays 36 3.3.4 How C Impacts the Obtaining Delay 38 3.4 Performance Evaluation 39 3.4.1 How C Impacts the Total Access Utility 39 3.4.2 Satisfying 100%, 90%, and 80% of Users 44 3.4.3 On-Demand Delivery 47 3.5 Conclusion 48 IV. Push-Share 50 4.1 Framework Details 50 4.2 System Model 53 4.3 Content Dissemination in Single Cell 56 4.3.1 Content Dissemination by Sharing Only 57 4.3.2 Content Dissemination with Initial Push and Final Push 59 4.3.3 Content Dissemination Energy Cost 62 4.4 Content Dissemination in Multiple Cells 63 4.4.1 Non-steady-state Modeling of MSs in Multiple Cells 66 4.4.2 Steady-State Modeling of MSs in Multiple Cells 66 4.4.3 How Handovers Affect the Content Dissemination 67 4.5 Optimization Framework 69 4.5.1 Minimum Dissemination Completion Delay 69 4.5.2 Minimum Dissemination Completion Cost 70 4.5.3 Conjunctive Minimization of Delay and Cost 71 4.6 Evaluation Results 73 4.6.1 Content Dissemination within One Single Cell 74 4.6.2 Content Dissemination within Multiple Cells 77 4.6.3 Optimization Framework 80 4.7 Conclusion 82 V. Summary and Future Work 84 5.1 A Comparison with Traffic Offloading based on Wi-Fi APs 85 5.2 Practical Deployment and Application 86 5.3 Future Work and Vision 88 Bibliography 90Docto

    Multiple Mobile Data Offloading Through Delay Tolerant Networks

    No full text
    To cope with the explosive traffic demands and limited capacity provided by the current cellular networks, Delay Tolerant Networking (DTN) is used to migrate traffic from the cellular networks to the free and high capacity device-todevice networks. The current DTN-based mobile data offloading models do not address the heterogeneity of mobile traffic and are based on simple network assumptions. In this paper, we establish a mathematical framework to study the problem of multiple mobile data offloading under realistic network assumptions, where 1) mobile data is heterogeneous in terms of size and lifetime, 2) mobile users have different data subscribing interests, and 3) the storage of offloading helpers is limited. We formulate the maximum mobile data offloading as a Submodular Function Maximization problem with multiple linear constraints of limited storage and propose greedy, approximated and optimal algorithms for different offloading scenarios. We show that our algorithms can effectively offload data to DTNs by extensive simulations which employ real traces of both humans and vehicles
    corecore