Data Offloading Techniques in Cellular Networks: A Survey
read more
Citations
Security for 4G and 5G cellular networks
A Survey on Mobile Data Offloading Technologies
The Internet of People (IoP): A new wave in pervasive mobile computing
Next generation IEEE 802.11 Wireless Local Area Networks : Current status, future directions and open challenges
A Survey of Opportunistic Offloading
References
The capacity of wireless networks
NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey
"A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. & Mobile Computing (WCMC) : Special issue on Mobile Ad Hoc Networking : Research
A survey of mobility models for ad hoc network research
Epidemic routing for partially-connected ad hoc networks
Related Papers (5)
A survey on mobile data offloading: technical and business perspectives
Frequently Asked Questions (13)
Q2. What are the future works mentioned in the paper "Data offloading techniques in cellular networks: a survey" ?
The authors further investigated open research and implementation challenges and the existing alternatives to mitigate the cellular overload problem.
Q3. What is the key to enabling future offloading capabilities to mobile smart devices?
The development of a novel IP-based transport protocol is an essential prerequisite to enable future offloading capabilities to mobile smart devices.
Q4. What are the realistic candidates for data offloading?
to date, T2T technologies using unlicensed band (like WiFi and Bluetooth) are the only realistic candidates for data offloading.
Q5. What is the way to incentivize subscribers to offload?
Operators can incentivize subscribers to offload by offering unlimited data through WiFi hot-spots (and leveraging instead on the capped cellular data).
Q6. What are the challenges of mobile data offloading?
Further challenges include the development of an infrastructure to ensure distributed trust and security to terminals involved in the offloading process.
Q7. How does the paper propose a sub-optimal greedy algorithm?
The paper proposes also a sub-optimal greedy algorithm that guarantees a 24% reduction in APs placement relative to non-delayed strategies.
Q8. What are the main issues that have been addressed by extensions to standard protocols?
Extensions to standard protocols started to appear to cope with these issues (e.g., SCTP, MPTCP), enabling to aggregate together the bandwidth offered by different technologies, and allowing seamless handover between distinct access technologies.
Q9. What are the main functional blocks for the offloading coordinator?
it is possible to identify, among all, three main interdependent functional blocks for the offloading coordinator: (i) monitoring, (ii) prediction, and (iii) cross-network interface management.
Q10. Why is delayed T2T-based offloading often seen as a quick and inexpensive?
For these reasons, delayed T2T-based offloading is often seen as a quick and inexpensive way to increase mobile network capacity and to handle the predicted data tsunami [50].
Q11. How does the algorithm determine when a transmission should be delayed?
This algorithm determines when deferring a transmission (in case it should be delayed) by adapting the offloading process to network availability and locationinformation.
Q12. What is the way to find the optimal instant of time to transfer data?
An ideal solution is to identify the optimal instant of time after which a user should stop deferring transmissions and start transferring data using the cellular interface, trading-off offloading efficiency and user satisfaction.
Q13. What are the three coverage metrics to predict the future movements of nodes?
As explained in Fig. 12, TOMP proposes three coverage metrics to predict the future movements of nodes: static coverage, freespace coverage, and graph-based coverage.