2015 14th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET) 2015
DOI: 10.1109/medhocnet.2015.7173296
|View full text |Cite
|
Sign up to set email alerts
|

Offloading cellular traffic with opportunistic networks: a feasibility study

Abstract: We conduct large-scale cellular trace-driven experiments comparing different opportunistic network coded data dissemination strategies and different cache seeding strategies for distributing a large data object across a country-scale network of thousands of local repositories. We compare fragmentation, source-only erasure coding, cache coding, network coding, and propose two new dissemination strategies motivated by performance issues. We also experiment with several strategies for pre-seeding information to t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 21 publications
0
6
0
Order By: Relevance
“…Before the deadline, every user of the new system was required to get some particular data using a Wi-Fi access point. The authors in [30] investigated a dataset of video requests obtained from real-world cellular traffic over a one-month period in a big metropolitan region to come up with a viable offloading approach.…”
Section: Overview Of Data Offloading Approachesmentioning
confidence: 99%
“…Before the deadline, every user of the new system was required to get some particular data using a Wi-Fi access point. The authors in [30] investigated a dataset of video requests obtained from real-world cellular traffic over a one-month period in a big metropolitan region to come up with a viable offloading approach.…”
Section: Overview Of Data Offloading Approachesmentioning
confidence: 99%
“…Energy Optimization. Techniques have been proposed to optimize web browsing via application-level optimization, including aggregating data traffic [12,26,47] or requests [11,31], and parallel downloading [8,25]. Our approach targets a lower level, by exploiting the heterogeneous hardware architecture to perform energy optimization.…”
Section: Related Workmentioning
confidence: 99%
“…Then the server will become the bottleneck of the system. In Valerio’s research on offloading with opportunistic networks, if a node cannot get the wanted content from the contacted nodes, it will download it through cellular networks [ 10 ]. After a node downloads its requested content, the node sends the content to some random neighbors in the same district.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, researchers have being studying how to offload mobile data from cellular networks onto opportunistic networks [ 2 , 3 , 4 , 5 , 6 , 7 , 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 ]. In opportunistic networks, it is difficult to build a continuous end-to-end routing path, so the networks are disruption tolerant.…”
Section: Introductionmentioning
confidence: 99%