Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Detection and Classification of Finer-Grained Human Activities Based on Stepped-Frequency Continuous-Wave Through-Wall Radar
Next Article in Special Issue
Closed-Loop Lifecycle Management of Service and Product in the Internet of Things: Semantic Framework for Knowledge Integration
Previous Article in Journal
Design and Application of Wuhan Ionospheric Oblique Backscattering Sounding System with the Addition of an Antenna Array (WIOBSS-AA)
Previous Article in Special Issue
A Task-Centric Cooperative Sensing Scheme for Mobile Crowdsourcing Systems
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distance-Based Opportunistic Mobile Data Offloading

1
School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
2
Computer Laboratory, University of Cambridge, Cambridge CB3 0FD, UK
3
Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong, China
*
Author to whom correspondence should be addressed.
Sensors 2016, 16(6), 878; https://doi.org/10.3390/s16060878
Submission received: 11 February 2016 / Revised: 27 May 2016 / Accepted: 8 June 2016 / Published: 15 June 2016
(This article belongs to the Special Issue Identification, Information & Knowledge in the Internet of Things)
Figure 1
<p>The structure of DOPS.</p> ">
Figure 2
<p>Illustrate of <math display="inline"> <semantics> <mrow> <msub> <mi mathvariant="normal">d</mi> <mrow> <mtext>ps</mtext> </mrow> </msub> </mrow> </semantics> </math> and <math display="inline"> <semantics> <mrow> <mi>M</mi> <mi>a</mi> <mi>x</mi> <mrow> <mo>(</mo> <mrow> <mo>{</mo> <msub> <mi>d</mi> <mi>t</mi> </msub> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mo>)</mo> </mrow> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mtext> </mtext> <mi>M</mi> <mi>a</mi> <mi>x</mi> <mrow> <mo>(</mo> <mrow> <mo>{</mo> <msub> <mi>d</mi> <mi>t</mi> </msub> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>,</mo> <mo> </mo> <msub> <mi>d</mi> <mi>t</mi> </msub> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mo>)</mo> </mrow> </mrow> </semantics> </math>, <math display="inline"> <semantics> <mrow> <mtext> </mtext> <mi>M</mi> <mi>a</mi> <mi>x</mi> <mrow> <mo>(</mo> <mrow> <mo>{</mo> <msub> <mi mathvariant="normal">d</mi> <mi mathvariant="normal">t</mi> </msub> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> <mo>,</mo> <mo> </mo> <msub> <mi>d</mi> <mi>t</mi> </msub> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> <mo>,</mo> <mtext> </mtext> <mo> </mo> <msub> <mi>d</mi> <mi>t</mi> </msub> <mrow> <mo>(</mo> <mn>3</mn> <mo>)</mo> </mrow> <mo>}</mo> </mrow> <mo>)</mo> </mrow> </mrow> </semantics> </math>.</p> ">
Figure 3
<p>An example of subscribing content and opportunistic publishing content in DOPS.</p> ">
Figure 4
<p>When a relay receives its subscribed content, the relay removes itself from the subscription table.</p> ">
Figure 5
<p>Contact time distribution.</p> ">
Figure 6
<p>Traffic offloading ratios under different subscriber ratios.</p> ">
Figure 7
<p>Offloading efficiency with the time before deadline.</p> ">
Versions Notes

Abstract

:
Cellular network data traffic can be offload onto opportunistic networks. This paper proposes a Distance-based Opportunistic Publish/Subscribe (DOPS) content dissemination model, which is composed of three layers: application layer, decision-making layer and network layer. When a user wants new content, he/she subscribes on a subscribing server. Users having the contents decide whether to deliver the contents to the subscriber based on the distance information. If in the meantime a content owner has traveled further in the immediate past time than the distance between the owner and the subscriber, the content owner will send the content to the subscriber through opportunistic routing. Simulations provide an evaluation of the data traffic offloading efficiency of DOPS.

1. Introduction

As smartphones have become more popular, more people are reading news and watching videos on those portable devices than before. Cisco reported that mobile data traffic increased 74% in 2015 [1]. In 2015, 51% of total mobile data was offloaded onto fixed networks, such as WiFi or femtocell. The most popular scenario of offloading mobile data through WiFi is when a user’s smartphone contacts a WiFi router located in his/her office or home. However, when people are outside of their offices and houses, they have to access Internet through a cellular network if there are no WiFi or femtocell infrastructures.
Recently, researchers have being studying how to offload mobile data from cellular networks onto opportunistic networks [2,3,4,5,6,7,8,9,10,11,12,13,14,15]. In opportunistic networks, it is difficult to build a continuous end-to-end routing path, so the networks are disruption tolerant. In such networks, a message cannot be directly routed to its destination from the source. The message is forwarded in a store-and-forward method. The source of a message sends its messages to some encountered nodes and these nodes forward the messages to some new nodes when they meet other nodes at some other places [2]. In this method, there would be many copies of one message, and if one copy is finally received by the destination, then the message is delivered successfully.
The delivery delay of opportunistic routing is longer than that of a fixed WiFi network because of its intermittent connectivities. However, people find that for some applications they can afford some delivery delay, such as when downloading movie trailers or multimedia magazines. Thus, these kinds of time insensitive applications or data can be offloaded from cellular networks onto opportunistic networks.
In the study of offloading mobile data from cellular network to opportunistic networks, researchers assume that a node will publish the content or data to opportunistic network if someone subscribes it, whereas we think this principle is not suitable for a large environment. For example, node A in city-1 subscribes to content and node B who is in city-2 has this content. City-1 is far away from city-2. If node B publishes the content onto an opportunistic network in city-2, the probability that this content can be delivered to city-1 and received by node A within a certain limited time is scant. Therefore, we think the distance between the subscriber and the provider of the content impacts the opportunistic routing performance and offloading efficiency.
In this paper we study the opportunistic data offloading from cellular networks through direct wireless communications between smartphones, using WiFi and Bluetooth. The main contributions of this paper are: (1) we study the issue of subscription selection which has not been studied previously; (2) we propose a distance-based mobile data opportunistic offloading model that we have called Distance-based Opportunistic Publish/Subscribe (DOPS).
When a user wants a specific content, he/she sends a content request to a content subscribing server (CSS) through an Internet connection. When another user having the requested content knows that the content is requested, he/she delivers the content to the requestor through opportunistic forwarding if the distance between the two users is shorter than the longest distance it travelled recently during the time duration before the subscription’s deadline. In some cases, many users may want the same content, and the traffic offloading efficiency increases if these subscribers of a common content receive the content through opportunistic networks. DOPS cannot work for time sensitive applications, such as video streaming. The content suitable to be delivered in DOPS is time insensitive data, such as multimedia newspapers, music, and movie trailers. Small video and music files are delivered as bulk files, not streaming files, which means the receiver cannot open the file before receiving it completely.

2. Related Work

There are two strategies to offload cellular networks traffic: one is to offload through WiFi access points and another is to offload onto opportunistic networks [3]. In the study of offloading cellular networks traffic through WiFi routers (APs), Dimatteo studied how many WiFi routers were needed to guarantee a certain quality of service [3]. Lee studied the delayed offloading [4]. When a user wants some data, his/her smartphone does not download it from cellular network. It waits to download the data until it can contact a WiFi infrastructure. With tens of minutes delay, 70%–90% of cellular network traffic can be offloaded. Car-Fi offloads data traffic from cellular networks to existing home Wi-Fi routers [5]. This traffic offloading method needs WiFi infrastructures, but the offloading efficiency of this method reduces if the WiFi infrastructure is insufficient [6].
The first study about offloading cellular traffic through opportunistic communication was done by Han et al. [7]. They studied how to select the initial k nodes as the target-set selection. Huang et al. studied how to extend a publish/subscribe system to a mobile network [8]. Meanwhile, they also assumed that nodes in the mobile network are contacted. However, the mobile network composed of mobile smartphones is intermittently connected networks, not ad-hoc networks. Push-and-track offloads traffic through opportunistic networks [9]. In push-and-track, the user sends acknowledgments to the server while receiving the content and the server decides whether to push the content into the network. Sometimes, the number of users is very large, and the server has to handle tens of thousands of subscriptions every day. Then the server will become the bottleneck of the system. In Valerio’s research on offloading with opportunistic networks, if a node cannot get the wanted content from the contacted nodes, it will download it through cellular networks [10]. After a node downloads its requested content, the node sends the content to some random neighbors in the same district. This method does not suit a scenario with low node density. Li et al. studied DTN-based mobile data offloading [11]. In their study, a service provider sends the data to some nodes and these nodes send the data to the subscribers with two-hop routing algorithm. Mehmeti et al. studied the average delay equation for delayed offloading [12]. Kouyoumdjieva et al. studied the relation between the smartphone’s energy and offloading efficiency, and proposed an energy-aware algorithm for opportunistic networks [13]. In addition, some researchers have begun to study the economics of mobile data offloading [14,15]. Anyway, none of these works considers the distance between the subscriber and the node that has the content, but this distance may determine whether the traffic offloading works. Also, these works do not take the deadline of the subscription into consideration, which means the subscription table will soon grow hugely and the subscribing server cannot work efficiently.

3. Distance-Based Opportunistic Push/Subscribe Content Dissemination Model

3.1. Hybrid Wireless Communication

We assume the smartphones in our study can communicate through cellular networks and WiFi networks, respectively. First of all, a smartphone is able to contact the cellular network base-station to access the Internet. Secondly, the smartphone is able to contact a WiFi router as well. In addition, the smartphone is supposed to be able to make direct WiFi contacts. WiFi direct contact is a new capability that builds a peer-to-peer connection between two WiFi devices. Two smartphones with WiFi direct communication ability can transmit and receive data without a WiFi router [16].

3.2. Introduction of DOPS

DOPS content dissemination model we proposed in this paper is composed of three layers: Application layer, Decision-making layer and Network layer. The structure of DOPS is shown in Figure 1.
The application layer copes with the things about the subscribing content and subscription management. The decision-making layer decides whether to publish the content requested by others. The network layer deals with relay nodes selection. Different opportunistic routing protocols can be selected to work in this layer.

3.3. Application Layer

3.3.1. Subscribing Content

When a user wants some new content, he/she sends a content request to the content subscribing server. We call the user a subscriber. The content subscribing server adds a subscription to it. The subscription is composed of the name of the content, the user’s ID, the deadline of the subscription and the subscriber’s location. The deadline of a subscription is similar to the time to live (TTL) of a network packet. The user will not download the content through cellular network until the deadline.
If a user subscribes to content, the user’s smartphone gets its current GPS location and records it in the subscription.

3.3.2. Subscription Management

When a user subscribes to some new content, the user sets how many days it can wait for the content. If a user has received the requested content before the deadline, it responds to the CSS and removes its subscription for this content. If a user fails to receive the requested content, the user can extend the deadline. However, if the user does not extend the deadline, CSS deletes the user’s subscription after a certain time. When a user subscribes to the content, the user just sets how many days or hours it is willing to wait from the current time rather than an exact time point. CSS calculates the exact time point of the deadline of this subscription, so it is not necessary that all users’ smartphones clocks be synchronous. All subscriptions are listed according to the sequence of their deadlines. If the deadline of a subscription is very near the current time, the subscription is at the top of the subscription table. If the deadline of a subscription is still many days from now, the subscription is at the bottom of the subscription table. When a provider accesses CSS and check the subscription list, it will check the subscription list from top to bottom.

3.4. Decision-Making Layer

3.4.1. Principle of Publishing Content

Among all users, some users may have the requested contents of other users. In this paper, we call the node that has others’ requested content a provider. However, even though a provider has the requested content, it is not obligatory that the provider publish its content. If the provider is very far away from the subscriber, the provider will not publish the requested content because the probability of the subscriber receiving the content is very low.
Let d p s be the distance from the provider to the subscriber, d t ( x ) be the distance of the provider travels in past x days. For instance, d t ( 2 ) means the distance of the provider travelled in past 2 days. If a provider accesses CSS and has the subscribed content in one of the subscriptions, the provider publishes the content if Equation (1) is true:
d p s M a x ( { d t ( 1 ) , d t ( 2 ) , , d t ( R d ) } )
In Equation (1), Rd is the remaining days from the current date to the deadline. M a x ( { d t ( 1 ) , d t ( 2 ) , , d t ( R d ) } ) is the longest distance that the provider has travelled in the past Rd days. For example, if the deadline is the day after tomorrow, Rd is 2. If the subscriber’s location is at location 1 in Figure 2, the provider will publish the content. If the subscriber’s location is at location 2, the provider will not publish the content.

3.4.2. Publishing Content

Every node periodically records its location. The location file format is (date,   G P S x , G P S y ). When a provider accesses CSS, it checks the subscription table. If it has the subscribed content in a subscription, the provider gets the deadline of the subscription and the subscriber’s location. Then it calculates the remaining days from the current date to the deadline. For example, if the remaining days are 3 days, it reads the past 3 days’ location records from its location file. Then the provider calculates the distances from its current location to each location ( G P S x , G P S y ) in the past 3 days, and it gets the longest distance d m a x . Afterwards, it computes d p s , which is the distance from current location to the subscriber’s location. If d m a x d p s , the provider will publish the content, otherwise, it will not.
In Figure 3, node_4 subscribes to video_1 on CSS and node_1 has this video. When node_1 contacts CSS, it finds that a node subscribed video_1. Node_1 gets the deadline of the subscription and the subscriber’s location, (x1, y1). For example, if today is 19 April 2016, the remaining days from today to 20 April 2016 is 1 day. Node_1 calculates the distance d p s     between it and (x1, y1). Assume d p s to be 4.5 km. Node_1 calculates the longest distance it travelled yesterday. Suppose d m a x to be 7 kilometers, node_1 begins to publish video_1 onto the opportunistic network through direct WiFi connections because d m a x > d p s . Node_1 sends video_1 to node_2 and node_3. Node_3 is carried by its user from one place to another place and meets node_4. Node_3 transmits video_1 to node_4 when they encounter each other.

3.5. Network Layer

The network layer deals with how to select the relay nodes so as to increase the delivery performance [17,18,19,20,21,22,23,24,25]. Selecting the next hop is the responsibility of routing protocols. We do not assign a specific opportunistic routing protocol for DOPS. Many opportunistic routing protocols could be employed here. Literatures [17,18,19,20] are opportunistic routing developed for delay tolerant networks. Literatures [21,22,23] are opportunistic routing protocols specially designed for subscribe/publish.
DPSP is publish/subscribe-based routing protocol for DTN networks [21]. When a router selects the relay nodes, it considers local resource constraints. Gao et al. studied the way of improving the cost-effectiveness of multicast by social analysis [22]. When a node selects relay nodes, it selects the nodes based on social centrality and social community. This approach can reduce the number of relays. MuRIS scheme allows nodes to deliver content via chosen paths, which can reach more subscribers at intermediate hops [23].

3.6. Traffic Offloading by Multi-Receiver

Sometimes, several nodes will subscribe to same content. There would be many subscriptions for a common content in CSS with different deadlines. Let subscriber ratio be the percent of the subscribers of a common content. While a content is routed to the subscriber, some receivers might be subscribers to this content. Once a node receives the subscribed content, it repeals its subscription for this content. Let offloading efficiency represent the ratio of the traffic offloaded from cellular networks to the total traffic includes offloaded traffic and cellular network traffic:
o f f l o a d i n g   e f f i c i e n c y = t r a f f i c   o f f l o a d e d   f r o m   c e l l u l a r   n e t w o r k s t o t a l   t r a f f i c
For example, node_2 to node_7 subscribed to video_1 as Figure 4 shows. Node_1 gets video_1 through a cellular network. Node_1 contacts CSS and knows that node_7 subscribed to video_1 many days ago. After comparing d m a x and d p s , node_1 decides to send video_1 to node_7. When node_1 encounters node_2 and node_3, it sends video_1 through a direct WiFi connection to node_2 and node_3 that also have subscribed to video_1 on CSS. After these two nodes receive video_1, they repeal their subscriptions to video_1 on CSS. However, as they are not the destination of the content delivery, they continue to transmit it to other nodes, and node_2 to node_7 receive video_1 before the deadlines of their subscriptions. In this case, only when node_1 downloaded video_1 through the cellular network, 6/7 cellular network traffic is offloaded onto an opportunistic network and the offloading efficiency is 85.7%.

4. Performance Evaluation

4.1. Simulation Setup

We evaluate the offloading efficiency of DOPS based on the simulation data from ONE, a simulation software for opportunistic network environments. In the simulator, the nodes were vehicles that traveled along the roads and the mobility model of these nodes was RandomWayPoint. The road map used in the simulation is Helsinki’s city area. The nodes density nearby the main streets was higher than in the suburb. The content was supposed to be music files and those files are from 2 M to 5 MB in size. The parameters we used in the simulation are listed in Table 1. Nodes communicate with each other through WiFi connections. Every 25 to 75 s, a randomly selected node downloaded a new music through the cellular networks. The subscribers were randomly selected from all nodes. The subscriber ratio in each round of simulation was constant. The subscriber ratios were 1%, 2%, …, 10%. We ran the simulation for 10 rounds and the results were the average of the simulation data of 10 rounds. The deadline of all the subscriptions is after 12 h. The opportunistic routing was Maxprop that is provided by the simulator and its delivery performance is very high.

4.2. Contact Time

The contact time distribution between nodes indicates how much data can be transmitted and received. In the simulation, the percent of contact time shorter than 10 s is 12.2% and the percent of contact time shorter than 5 s is 5.5%, hence most of contact time is longer than 5 s as Figure 5 shows. Assuming the WiFi bandwidth to be 10 MB/s, if nodes transmit a video no larger than 55 M, the probability of transferring the file successfully among all contacts is more than 94.5%. Let P (contact time ≥ X) be the probability of contact time longer than X s.

4.3. Result: Traffic Offloading Efficiency

All nodes are supposed to participate in content dissemination. We assume some subscribers would request the same content. The more users are interested in the same content, the higher the offloading efficiency is. In the simulation, the average delivery ratio is 99.6%, which means that 99.6% of all users receive each file. Figure 6 shows the relation between the traffic offloading efficiency and the subscriber ratio. In our study, the total number of users is 180. If two users subscribe to the same music, the subscriber ratio is 1%. Assume one of them got the initial file through a cellular network and another got the file through opportunistic routing, then the offloading efficiency is 50%. If 16 users have subscribed a same music, the subscriber ratio is 16 180 9 % . Fifteen subscribers among them got the file by opportunistic routing, so the offloading efficiency is 93.75 % . As the delivery ratio of the simulation was very high (99.6%), the morphological feature of the curve in Figure 6 approximates the morphological feature of y = x x + 1 , ( x > 0 ) . When the subscriber ratio increases at the beginning phase, the offloading efficiency increases rapidly. When the subscriber ratio is larger than 7%, the growth rate of offloading efficiency slows down.
The deadlines of all subscriptions were after 12 h from the beginning of the simulation. The average delivery delay from when a file was published to the time it was received was 3.5 min. Compared with 12 h, 3.5 min is a short time duration. Hence, the time a subscriber can receive its required content depends on the frequency with which the providers access the CSS and find the subscription. If a smartphone accesses a CSS every 30 min and some smartphones have the subscribed content, then the probability of a subscriber receiving a file smaller than 55 MB within (30 + 3.5) min is higher than P(contact time ≥ 5) × delivery ratio = 94.5% × 99.6% = 94.1%.
The time length before the deadline impacts the offloading efficiency. If a user sets the deadline just 10 min later, it means the user potentially hopes the content provider to be nearby. However, the probability of this situation being true is very low. If the user can wait several hours to get the content, more users would access CSS and the probability that a provider sends the requested content to the subscriber increases, as Figure 7 shows.
If a user downloads a video through a 3G cellular network, the user must pay the bandwidth usage fee. For example, if a video file is 100 MB, it will cost the user 8.3 min to download it through 3G cellular network at an average practical bandwidth of 200 KB/s, and the user has to pay about 1 dollar for this bandwidth usage in China. If a person downloads files through 3G every day, he/she has to pay a lot of money. Therefore, traffic offloading through the opportunistic routing can help subscribers save money.

5. Discussion

Some Internet websites, such as youtube.com and youku.com, provide lots of videos every day. If all Internet users watch videos from the websites directly, the websites have to rent a high bandwidth from the cellular network operators and pay a lot of money for this. Therefore, these websites tend to build a peer-to-peer Content Delivery Network CDN composed of mobile smartphones. On one hand, some users can subscribe a content and wait to receive it. Then, these websites can decrease the bandwidth usage fee. On the other hand, if a user can receive the request content through opportunistic routing, the user does not need to pay for the cellular network bandwidth usage fee as well.

6. Conclusions

In DOPS, when a user wants some content without downloading it directly through a cellular network, the user subscribes to the required content on a CSS through the cellular network. Before the deadline of the subscription, the user will not download it. Some other users will contact CSS and find the subscriptions. If a user has the content subscribed by others, the user calculates   d m a x and d p s . If d m a x d p s , the user sends the content to some encountering users by opportunistic routing and the content is delivered through a WiFi direct connection. The simulation results show that DOPS can offload 50%–94.1% of cellular network traffic with the subscriber percentage being 1% to 10%. This technology can be used in Internet content provision, by which the websites can save a lot on cellular network bandwidth fees. For future work, we will further study how to manage the subscriptions more efficiently.

Acknowledgments

This work was supported by National Natural Science Foundation of China (Grant No. 61472046, 61372109). Pietro Lio is supported by the EU FP7 project RECOGNITION: Relevance and Cognition for Self-Awareness in a Content-Centric Internet.

Author Contributions

Xiaofeng Lu conceived, designed and performed the experiments; Pietro Lio and Pan Hui analyzed the data; Xiaofeng Lu wrote the paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2013–2018. Available online: http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white_paper_c11-520862.html (accessed on 9 June 2016).
  2. Laoutaris, N.; Smaragdakis, G.; Rodriguez, P.; Sundaram, R. Delay-tolerant bulk data transfer on the Internet. ACM Sigmetrics Perform. Eval. Rev. 2009, 21, 229–238. [Google Scholar]
  3. Dimatteo, S.; Hui, P.; Han, B.; Li, V.O. Cellular traffic offloading through WiFi networks. In Proceedings of the Mobile Adhoc and Sensor Systems (MASS), Valencia, Spain, 17–22 October 2011.
  4. Lee, K.; Lee, J.; Yi, Y.; Rhee, I.; Chong, S. Mobile data offloading: How much can WiFi deliver? IEEE ACM Trans. Netw. 2013, 21, 536–550. [Google Scholar] [CrossRef]
  5. Pesavento, D.; Grassi, G.; Pau, G. Demo: Car-Fi: Opportunistic V2I by exploiting dual-access Wi-Fi networks. In Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, Paris, France, 7–11 September 2015; pp. 173–175.
  6. Kim, Y.; Lee, K.; Shroff, N.B. An analytical framework to characterize the efficiency and delay in a mobile data offloading system. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing, Philadelphia, PA, USA, 18–21 August 2014.
  7. Han, B.; Hui, P.; Kumar, V.S.; Marathe, M.V.; Pei, G.; Srinivasan, A. Cellular traffic offloading through opportunistic communications: A case study. In Proceedings of the ACM Workshop on Challenged Networks, Chicago, IL, USA, 20–24 September 2010.
  8. Huang, Y.; Garcia-Molina, H. Publish/subscribe in a mobile environment. Wirel. Netw. 2001, 10, 27–34. [Google Scholar] [CrossRef]
  9. Whitbeck, J.; Lopez, Y.; Leguay, J.; Conan, V.; de Amorim, M.D. Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding. Pervasive Mob. Comput. 2012, 8, 682–697. [Google Scholar] [CrossRef]
  10. Valerio, L.; Ben Abdesslemy, F.; Lindgreny, A.; Bruno, R.; Passarella, A.; Luoto, M. Offloading cellular traffic with opportunistic networks: A feasibility study. In Proceedings of the Ad Hoc Networking Workshop, Vilamoura, Portugal, 17–18 June 2015.
  11. Li, Y.; Qian, M.; Jin, D.; Hui, P.; Wang, Z.; Chen, S. Multiple mobile data offloading through disruption tolerant networks. IEEE Trans. Mob. Comput. 2014, 13, 1579–1596. [Google Scholar]
  12. Mehmeti, F.; Spyropoulos, T. Is it worth to be patient? Analysis and optimization of delayed mobile data offloading. In Proceedings of the INFOCOM IEEE Conference on Computer Communications, Toronto, ON, Canada, 27 April–2 May 2014.
  13. Kouyoumdjieva, S.; Karlsson, G. Energy-aware opportunistic mobile data offloading for users in urban environments. In Proceedings of the IFIP Networking Conference, Toulouse, France, 20–22 May 2015.
  14. Gao, L.; Iosifidis, G.; Huang, J.; Tassiulas, L.; Li, D. Bargaining-based mobile data offloading. IEEE J. Sel. Areas Commun. 2014, 32, 1114–1125. [Google Scholar] [CrossRef]
  15. Paris, S.; Martignon, F.; Filippini, I.; Chen, L. An efficient auction-based mechanism for mobile data offloading. IEEE Trans. Mob. Comput. 2015, 14, 1573–1586. [Google Scholar] [CrossRef]
  16. Camps-Mur, D.; Garcia-Saavedra, A.; Serrano, P. Device-to-device communications with Wi-Fi Direct: overview and experimentation. IEEE Wirel. Commun. 2013, 20, 96–104. [Google Scholar] [CrossRef]
  17. Burgess, J.; Gallagher, B.; Jensen, D.; Levine, B.N. MaxProp: Routing for vehicle-based disruption-tolerant networks. In Proceedings of the IEEE International Conference on Computer Communications INFOCOM, Barcelona, Spain, 23–29 April 2006.
  18. Lu, X.; Lio, P.; Hui, P.; Qu, Z. Nodes density adaptive opportunistic forwarding protocol for intermittently connected networks. In Proceedings of the International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI), Beijing, China, 17–18 October 2014.
  19. Xiao, M.; Wu, J.; Huang, L. Community-aware opportunistic routing in mobile social networks. IEEE Trans. Comput. 2014, 63, 1682–1695. [Google Scholar] [CrossRef]
  20. Yao, H.; Huang, H.; Zeng, D.; Li, B.; Guo, S. An energy-aware deadline-constrained message delivery in delay-tolerant networks. Wirel. Netw. 2014, 20, 1981–1993. [Google Scholar] [CrossRef]
  21. Greifenberg, J.; Kutscher, D. Efficient publish/subscribe-based multicast for opportunistic networking with self-organized resource utilization. In Proceedings of the International Conference on Advanced Information Networking and Applications, Okinawa, Japan, 25–28 March 2008.
  22. Gao, W.; Li, Q.; Zhao, B.; Cao, G. Multicasting in delay tolerant networks: A social network perspective. In Proceedings of the Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, New Orleans, LA, USA, 18–24 May 2009.
  23. Wang, Y.; Chuah, M.C.; Chen, Y. Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 2014, 13, 370–381. [Google Scholar] [CrossRef]
  24. Guo, J.; Zhang, H.; Sun, Y.; Bie, R. Square-root unscented Kalman filtering-based localization and tracking in the Internet of Things. Pers. Ubiquitous Comput. 2012, 18, 1824–1829. [Google Scholar]
  25. Sun, Y.; Yu, X.; Bie, R.; Song, H. Discovering Time-dependent Shortest Path on Traffic Graph for Drivers towards Green Driving. J. Netw. Comput. Appl. 2016, in press. [Google Scholar] [CrossRef]
Figure 1. The structure of DOPS.
Figure 1. The structure of DOPS.
Sensors 16 00878 g001
Figure 2. Illustrate of d ps and M a x ( { d t ( 1 ) } ) ,   M a x ( { d t ( 1 ) ,   d t ( 2 ) } ) ,   M a x ( { d t ( 1 ) ,   d t ( 2 ) ,     d t ( 3 ) } ) .
Figure 2. Illustrate of d ps and M a x ( { d t ( 1 ) } ) ,   M a x ( { d t ( 1 ) ,   d t ( 2 ) } ) ,   M a x ( { d t ( 1 ) ,   d t ( 2 ) ,     d t ( 3 ) } ) .
Sensors 16 00878 g002
Figure 3. An example of subscribing content and opportunistic publishing content in DOPS.
Figure 3. An example of subscribing content and opportunistic publishing content in DOPS.
Sensors 16 00878 g003
Figure 4. When a relay receives its subscribed content, the relay removes itself from the subscription table.
Figure 4. When a relay receives its subscribed content, the relay removes itself from the subscription table.
Sensors 16 00878 g004
Figure 5. Contact time distribution.
Figure 5. Contact time distribution.
Sensors 16 00878 g005
Figure 6. Traffic offloading ratios under different subscriber ratios.
Figure 6. Traffic offloading ratios under different subscriber ratios.
Sensors 16 00878 g006
Figure 7. Offloading efficiency with the time before deadline.
Figure 7. Offloading efficiency with the time before deadline.
Sensors 16 00878 g007
Table 1. The parameters in the simulation.
Table 1. The parameters in the simulation.
ParameterValue
Number of nodes180
TTL60 min
Wi-Fi transmission range100 m
Size of the content2 M~5 M
Simulation time1 day
Transmission speed10 Mbps
Simulation area15.3 km2
Nodes travel speed7 to 10 m/s
Node‘s buffer100 M
Opportunistic routingMaxprop

Share and Cite

MDPI and ACS Style

Lu, X.; Lio, P.; Hui, P. Distance-Based Opportunistic Mobile Data Offloading. Sensors 2016, 16, 878. https://doi.org/10.3390/s16060878

AMA Style

Lu X, Lio P, Hui P. Distance-Based Opportunistic Mobile Data Offloading. Sensors. 2016; 16(6):878. https://doi.org/10.3390/s16060878

Chicago/Turabian Style

Lu, Xiaofeng, Pietro Lio, and Pan Hui. 2016. "Distance-Based Opportunistic Mobile Data Offloading" Sensors 16, no. 6: 878. https://doi.org/10.3390/s16060878

APA Style

Lu, X., Lio, P., & Hui, P. (2016). Distance-Based Opportunistic Mobile Data Offloading. Sensors, 16(6), 878. https://doi.org/10.3390/s16060878

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop