skip to main content
10.1145/3440749.3442595acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Enhancing Communication Efficiency in Mobile Networks Using Smartphone-Enabled Edge Computing

Published:13 May 2021Publication History

ABSTRACT

The rapid increase of edge devices such as smartphones, tablets, and machine type communication (MTC) devices, influences the generation of a massive amount of data traffic. In this regard, mobile networks face the challenges to accommodate the coming of enormous data traffic, especially on the transmitting and processing. In addressing the problem mentioned above, mobile networks always improve the limited network capacity by extending the channel bandwidth or upgrading the systems. However, these solutions incur invertible mobile network expenses. Since the capability of edge devices like smartphones has improved in terms of storage, CPU, and speed, it is advantageous to leverage this. In this paper, we use smartphone capability to enhance resource consumption on mobile networks. To clarify our idea, we use the real data of calling data records collected from the telecommunication company. The proposed approach improves the communication efficiency of mobile networks.

References

  1. GSMA, G. Intelligence, GSMA, and G. Intelligence, "Understanding 5G: Perspectives on future technological advancements in mobile," GSMA Intell. Underst. 5G, no. December, pp. 3–15, 2014, [Online]. Available: https://gsmaintelligence.com/research/?file=141208-5g.pdf&download.Google ScholarGoogle Scholar
  2. M. R. Bosunia, A. Kim, D. P. Jeong, C. Park, and S. H. Jeong, "Efficient data delivery based on content-centric networking," in2014 International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014, pp. 300–304, doi: 10.1109/BIGCOMP.2014.6741457.Google ScholarGoogle Scholar
  3. Y. Pan, P. Thulasiraman, and Y. Wang, "Overview of Cloudlet , Fog Computing , Edge Computing , and Dew Computing," in Proceedings of The 3rd International Workshop on Dew Computing, 2018, pp. 20–23.Google ScholarGoogle Scholar
  4. M. Satyanarayanan, "The emergence of edge computing," Computer (Long. Beach. Calif)., 2017, doi: 10.1109/MC.2017.9.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. H. Tan, Z. Han, X. Y. Li, and F. C. M. Lau, "Online job dispatching and scheduling in edge-clouds," 2017, doi: 10.1109/INFOCOM.2017.8057116.Google ScholarGoogle Scholar
  6. A. R. Al-Ali, M. Al-Rousan, and M. Al-Shaikh, "Embedded system-based mobile patient monitoring device," 2003, doi: 10.1109/cbms.2003.1212814.Google ScholarGoogle ScholarCross RefCross Ref
  7. U. Paul, A. P. Subramanian, M. M. Buddhikot, and S. R. Das, "Understanding traffic dynamics in cellular data networks," 2011, doi: 10.1109/INFCOM.2011.5935313.Google ScholarGoogle ScholarCross RefCross Ref
  8. Z. Yu, Z. Yu, and Y. Chen, "Multi-hop Mobility Prediction," Mob. Networks Appl., 2016, doi: 10.1007/s11036-015-0668-2.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Laner, P. Svoboda, N. Nikaein, and M. Rupp, "Traffic models for machine type communications," 2013.Google ScholarGoogle Scholar
  10. A. Asadi, Q. Wang, and V. Mancuso, "A survey on device-to-device communication in cellular networks," IEEE Commun. Surv. Tutorials, 2014, doi: 10.1109/COMST.2014.2319555.Google ScholarGoogle Scholar
  11. W. U. Rehman, T. Salam, J. Xu, and X. Tao, "Capacity enhancement in 60 GHz based D2D networks by relay selection and scheduling," Int. J. Antennas Propag., 2015, doi: 10.1155/2015/205163.Google ScholarGoogle Scholar
  12. Y. Wang, X. Tao, X. Zhang, and Y. Gu, "Cooperative Caching Placement in Cache-Enabled D2D Underlaid Cellular Network," IEEE Commun. Lett., 2017, doi: 10.1109/LCOMM.2017.2664805.Google ScholarGoogle Scholar
  13. G. Rigazzi, N. K. Pratas, P. Popovski, and R. Fantacci, "Aggregation and trunking of M2M traffic via D2D connections," 2015, doi: 10.1109/ICC.2015.7248779.Google ScholarGoogle ScholarCross RefCross Ref
  14. R. Atat, L. Liu, N. Mastronarde, and Y. Yi, "Energy harvesting-based D2D-assisted machine-type communications," IEEE Trans. Commun., 2017, doi: 10.1109/TCOMM.2016.2639507.Google ScholarGoogle Scholar
  15. G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, "M2M: From mobile to embedded internet," IEEE Commun. Mag., 2011, doi: 10.1109/MCOM.2011.5741144.Google ScholarGoogle Scholar
  16. C. Pereira and A. Aguiar, "Towards Efficient Mobile M2M Communications: Survey and Open Challenges," Sensors, vol. 14, no. 10, pp. 19582–19608, Oct. 2014, doi: 10.3390/s141019582.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Chen, S. Mao, and Y. Liu, "Big data: A survey," in Mobile Networks and Applications, 2014, vol. 19, no. 2, pp. 171–209, doi: 10.1007/s11036-013-0489-0.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. C. C. Aggarwal, Managing and mining sensor data, vol. 9781461463. 2014.Google ScholarGoogle Scholar
  19. C. Robert, "Machine Learning, a Probabilistic Perspective," CHANCE, vol. 27, no. 2, pp. 62–63, 2014, doi: 10.1080/09332480.2014.914768.Google ScholarGoogle ScholarCross RefCross Ref
  20. E. Nan, X. Chu, W. Guo, and J. Zhang, "User data traffic analysis for 3G cellular networks," 2013, doi: 10.1109/ChinaCom.2013.6694641.Google ScholarGoogle ScholarCross RefCross Ref
  21. Z. Q. Jiang, W. J. Xie, M. X. Li, B. Podobnik, W. X. Zhou, and H. E. Stanley, "Calling patterns in human communication dynamics," Proc. Natl. Acad. Sci. U. S. A., 2013, doi: 10.1073/pnas.1220433110.Google ScholarGoogle Scholar
  22. M.-X. Li, W.-X. Zhou, H. E. Stanley, W.-J. Xie, B. Podobnik, and Z.-Q. Jiang, "Calling patterns in human communication dynamics," Proc. Natl. Acad. Sci. U. S. A., vol. 110, no. 5, pp. 1600–1605, 2013, doi: 10.1073/pnas.1220433110.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Enhancing Communication Efficiency in Mobile Networks Using Smartphone-Enabled Edge Computing
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
        November 2020
        313 pages
        ISBN:9781450388863
        DOI:10.1145/3440749

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 13 May 2021

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited
      • Article Metrics

        • Downloads (Last 12 months)10
        • Downloads (Last 6 weeks)1

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format