ABSTRACT
The rapid increase of edge devices such as smartphones, tablets, and machine type communication (MTC) devices, influences the generation of a massive amount of data traffic. In this regard, mobile networks face the challenges to accommodate the coming of enormous data traffic, especially on the transmitting and processing. In addressing the problem mentioned above, mobile networks always improve the limited network capacity by extending the channel bandwidth or upgrading the systems. However, these solutions incur invertible mobile network expenses. Since the capability of edge devices like smartphones has improved in terms of storage, CPU, and speed, it is advantageous to leverage this. In this paper, we use smartphone capability to enhance resource consumption on mobile networks. To clarify our idea, we use the real data of calling data records collected from the telecommunication company. The proposed approach improves the communication efficiency of mobile networks.
- GSMA, G. Intelligence, GSMA, and G. Intelligence, "Understanding 5G: Perspectives on future technological advancements in mobile," GSMA Intell. Underst. 5G, no. December, pp. 3–15, 2014, [Online]. Available: https://gsmaintelligence.com/research/?file=141208-5g.pdf&download.Google Scholar
- M. R. Bosunia, A. Kim, D. P. Jeong, C. Park, and S. H. Jeong, "Efficient data delivery based on content-centric networking," in2014 International Conference on Big Data and Smart Computing, BIGCOMP 2014, 2014, pp. 300–304, doi: 10.1109/BIGCOMP.2014.6741457.Google Scholar
- Y. Pan, P. Thulasiraman, and Y. Wang, "Overview of Cloudlet , Fog Computing , Edge Computing , and Dew Computing," in Proceedings of The 3rd International Workshop on Dew Computing, 2018, pp. 20–23.Google Scholar
- M. Satyanarayanan, "The emergence of edge computing," Computer (Long. Beach. Calif)., 2017, doi: 10.1109/MC.2017.9.Google ScholarDigital Library
- H. Tan, Z. Han, X. Y. Li, and F. C. M. Lau, "Online job dispatching and scheduling in edge-clouds," 2017, doi: 10.1109/INFOCOM.2017.8057116.Google Scholar
- A. R. Al-Ali, M. Al-Rousan, and M. Al-Shaikh, "Embedded system-based mobile patient monitoring device," 2003, doi: 10.1109/cbms.2003.1212814.Google ScholarCross Ref
- U. Paul, A. P. Subramanian, M. M. Buddhikot, and S. R. Das, "Understanding traffic dynamics in cellular data networks," 2011, doi: 10.1109/INFCOM.2011.5935313.Google ScholarCross Ref
- Z. Yu, Z. Yu, and Y. Chen, "Multi-hop Mobility Prediction," Mob. Networks Appl., 2016, doi: 10.1007/s11036-015-0668-2.Google ScholarDigital Library
- M. Laner, P. Svoboda, N. Nikaein, and M. Rupp, "Traffic models for machine type communications," 2013.Google Scholar
- A. Asadi, Q. Wang, and V. Mancuso, "A survey on device-to-device communication in cellular networks," IEEE Commun. Surv. Tutorials, 2014, doi: 10.1109/COMST.2014.2319555.Google Scholar
- W. U. Rehman, T. Salam, J. Xu, and X. Tao, "Capacity enhancement in 60 GHz based D2D networks by relay selection and scheduling," Int. J. Antennas Propag., 2015, doi: 10.1155/2015/205163.Google Scholar
- Y. Wang, X. Tao, X. Zhang, and Y. Gu, "Cooperative Caching Placement in Cache-Enabled D2D Underlaid Cellular Network," IEEE Commun. Lett., 2017, doi: 10.1109/LCOMM.2017.2664805.Google Scholar
- G. Rigazzi, N. K. Pratas, P. Popovski, and R. Fantacci, "Aggregation and trunking of M2M traffic via D2D connections," 2015, doi: 10.1109/ICC.2015.7248779.Google ScholarCross Ref
- R. Atat, L. Liu, N. Mastronarde, and Y. Yi, "Energy harvesting-based D2D-assisted machine-type communications," IEEE Trans. Commun., 2017, doi: 10.1109/TCOMM.2016.2639507.Google Scholar
- G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K. D. Johnson, "M2M: From mobile to embedded internet," IEEE Commun. Mag., 2011, doi: 10.1109/MCOM.2011.5741144.Google Scholar
- C. Pereira and A. Aguiar, "Towards Efficient Mobile M2M Communications: Survey and Open Challenges," Sensors, vol. 14, no. 10, pp. 19582–19608, Oct. 2014, doi: 10.3390/s141019582.Google ScholarCross Ref
- M. Chen, S. Mao, and Y. Liu, "Big data: A survey," in Mobile Networks and Applications, 2014, vol. 19, no. 2, pp. 171–209, doi: 10.1007/s11036-013-0489-0.Google ScholarDigital Library
- C. C. Aggarwal, Managing and mining sensor data, vol. 9781461463. 2014.Google Scholar
- C. Robert, "Machine Learning, a Probabilistic Perspective," CHANCE, vol. 27, no. 2, pp. 62–63, 2014, doi: 10.1080/09332480.2014.914768.Google ScholarCross Ref
- E. Nan, X. Chu, W. Guo, and J. Zhang, "User data traffic analysis for 3G cellular networks," 2013, doi: 10.1109/ChinaCom.2013.6694641.Google ScholarCross Ref
- Z. Q. Jiang, W. J. Xie, M. X. Li, B. Podobnik, W. X. Zhou, and H. E. Stanley, "Calling patterns in human communication dynamics," Proc. Natl. Acad. Sci. U. S. A., 2013, doi: 10.1073/pnas.1220433110.Google Scholar
- M.-X. Li, W.-X. Zhou, H. E. Stanley, W.-J. Xie, B. Podobnik, and Z.-Q. Jiang, "Calling patterns in human communication dynamics," Proc. Natl. Acad. Sci. U. S. A., vol. 110, no. 5, pp. 1600–1605, 2013, doi: 10.1073/pnas.1220433110.Google ScholarCross Ref
Index Terms
- Enhancing Communication Efficiency in Mobile Networks Using Smartphone-Enabled Edge Computing
Recommendations
Mobile Work Efficiency: Balancing Between Benefits, Costs and Sacrifices
Smartphones can be characterized as multipurpose mobile devices, or as pocket-sized mobile computers and multimedia devices. In the fieldwork of mobile journalists in news reporting, the efficiency of work could potentially be enhanced with smartphones. ...
Mobile computing at the edge (keynote)
MOBILESoft 2014: Proceedings of the 1st International Conference on Mobile Software Engineering and SystemsAs sales of mobile devices grow and smartphones and tablets become for many the preferred way of interacting with the Internet, social media and the enterprise, organizations are striving to push content and functionality out to mobile users. However, ...
The action of looking at a mobile phone display as nonverbal behavior/communication
A model for the action of looking at a mobile phone display was constructed.The action was considered using a nonverbal behavior/communication model.The action can cause a change of social power and a potential discontent.Double concealment was found to ...
Comments