Abstract:Abstract3G networks are currently overloaded, due to the increasing popularity of various applications for smartphones. Offloading mobile data traffic through opportunistic communications is a promising solution to partially solve this problem, because there is almost no monetary cost for it. We propose to exploit opportunistic communications to facilitate information dissemination in the emerging Mobile Social Networks (MoSoNets) and thus reduce the amount of mobile data traffic. As a case study, we investiga… Show more
“…However, not all the associated constraints are linear constraints, indicating that this constrained optimization problem does not belong to the category of linear programming problems. Fortunately, we can use the reformulation linearization technique (RLT) [3] to transform those nonlinear constraints into linear expressions and, consequently, we can use the existing optimization tool kits, such as CPLEX [8] and YALMIP [12], to solve this constrained maximization problem. By solving this constrained maximization problem, we obtain the total amount of data that can be transmitted successfully, namely, the maximized objective value.…”
Section: ) Optimization Solutionmentioning
confidence: 99%
“…A mobile phone user with dying battery may for example refuse to contribute the scarce battery resource to D2D communications just to improve the downloading speed of others, and many users may not be pleased to devote part of the limited buffer of their mobile devices to safeguarding the interests of strangers. Unfortunately, current researches have assumed that UEs are always willing to act in a cooperative way and fail to consider the inherent selfishness of UEs in the D2D communication systems [1], [3], [5], [10], [11], which may lead to overestimation of the system performance and misinterpretation of the relevant properties. Obviously, if most users are unwilling to participate in D2D transmission, the resources cannot be utilized sufficiently, and a D2D underlaying cellular system will not able to operate successfully.…”
Abstract-In a device-to-device (D2D) communication underlaying cellular network, user equipment are required to operate cooperatively and unselfishly to transmit data as relays. However, most users more or less behave in a selfish way, which makes user selfishness a key factor that affects the performance of the whole communication system. We focus on the impact of user selfishness on D2D communications. By separating the user selfishness into two types in accordance with two D2D transmission modes, which are connected D2D transmission and opportunistic D2D transmission, we propose a time-varying graph model that characterizes the impacts of both individual and social selfishness on the D2D communications. Simulation results obtained under the realistic networking settings indicate that the interaction between connected and opportunistic selfishness worsens the impairment caused by individual selfishness. Additionally, when concerning social selfishness, inside-community selfishness can be ignored in some occasions, while otherwise its role is heavily influenced by community numbers.
“…However, not all the associated constraints are linear constraints, indicating that this constrained optimization problem does not belong to the category of linear programming problems. Fortunately, we can use the reformulation linearization technique (RLT) [3] to transform those nonlinear constraints into linear expressions and, consequently, we can use the existing optimization tool kits, such as CPLEX [8] and YALMIP [12], to solve this constrained maximization problem. By solving this constrained maximization problem, we obtain the total amount of data that can be transmitted successfully, namely, the maximized objective value.…”
Section: ) Optimization Solutionmentioning
confidence: 99%
“…A mobile phone user with dying battery may for example refuse to contribute the scarce battery resource to D2D communications just to improve the downloading speed of others, and many users may not be pleased to devote part of the limited buffer of their mobile devices to safeguarding the interests of strangers. Unfortunately, current researches have assumed that UEs are always willing to act in a cooperative way and fail to consider the inherent selfishness of UEs in the D2D communication systems [1], [3], [5], [10], [11], which may lead to overestimation of the system performance and misinterpretation of the relevant properties. Obviously, if most users are unwilling to participate in D2D transmission, the resources cannot be utilized sufficiently, and a D2D underlaying cellular system will not able to operate successfully.…”
Abstract-In a device-to-device (D2D) communication underlaying cellular network, user equipment are required to operate cooperatively and unselfishly to transmit data as relays. However, most users more or less behave in a selfish way, which makes user selfishness a key factor that affects the performance of the whole communication system. We focus on the impact of user selfishness on D2D communications. By separating the user selfishness into two types in accordance with two D2D transmission modes, which are connected D2D transmission and opportunistic D2D transmission, we propose a time-varying graph model that characterizes the impacts of both individual and social selfishness on the D2D communications. Simulation results obtained under the realistic networking settings indicate that the interaction between connected and opportunistic selfishness worsens the impairment caused by individual selfishness. Additionally, when concerning social selfishness, inside-community selfishness can be ignored in some occasions, while otherwise its role is heavily influenced by community numbers.
“…As mentioned in [9] the integration of an effective incentive mechanism in a user-operated offloading mechanism is a challenging problem. The application content provider reduces its expenses to the CDN provider that manages its content and the corresponding cellular providers significantly decrease the stress on their links.…”
Section: B Incentives and Data Integritymentioning
Abstract-The vast majority of mobile data transfers today follow the traditional client-server model. Although in the fixed network P2P approaches have been exploited and shown to be very efficient, in the mobile domain there has been limited attempt to leverage on P2P (D2D) for large-scale content distribution (i.e., not DTN-like, point-to-point message transfers). In this paper, we explore the potential of a user-operated, smartphonecentric content distribution model for smartphone applications. In particular, we assume source nodes that are updated directly from the content provider (e.g., BBC, CNN), whenever updates are available; destination nodes are then directly updated by source nodes in a D2D manner. We leverage on sophisticated information-aware and application-centric connectivity techniques to distribute content between mobile devices in densely-populated urban environments. Our target is to investigate the feasibility of an opportunistic content distribution network in an attempt to achieve widespread distribution of heavy content (e.g., video files) to the majority of the destination nodes. We propose ubiCDN as a ubiquitous, user-operated and distributed CDN for mobile applications.
“…Thus, a new trend, usually referred to as mobile data offloading, has emerged. That is, while the cellular infrastructure will continue to provide essential wide-area coverage and support for high-mobility users, it will be complemented with WiFi hotspots, toward which data traffic should be offloaded whenever possible [9,13].…”
Abstract. We analyze next generation cellular networks, offering connectivity to mobile users through LTE as well as WiFi. We develop a framework based on the Markovian agent formalism, which can model several aspects of the system, including the dynamics of user traffic and the allocation of the network radio resources. In particular, through a mean-field solution, we show the ability of our framework to capture the system behavior in flash-crowd scenarios, i.e., when a burst of traffic requests takes place in some parts of the network service area.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.