计算机科学与技术(参考文献)Femto-Matching:Efficient Traffic Offloading in Heterogeneous Cellular Networks

Femto-Matching:Efficient Traffic Offloading in Heterogeneous Cellular Networks Wei Wang,Xiaobing Wu,Lei Xie and Sanglu Lu Nanjing University April 28,2015 日,+司1三13卡三分Q0 1/1
Femto-Matching: Efficient Traffic Offloading in Heterogeneous Cellular Networks Wei Wang , Xiaobing Wu, Lei Xie and Sanglu Lu Nanjing University April 28, 2015 1/1

Heterogeneous Cellular Networks ti femto-cell Micro-cell femto-cell femto-cell Marco-cell femto-cell Micro-cell femto-cell Cellular networks use multiple layers of basestations to im- prove spatial utility Small cells such as femtocell or WiFi APs help offloading the traffic form the macro-cell 2/1
Heterogeneous Cellular Networks Micro-cell femto-cell femto-cell femto-cell femto-cell Micro-cell femto-cell Marco-cell • Cellular networks use multiple layers of basestations to improve spatial utility • Small cells such as femtocell or WiFi APs help offloading the traffic form the macro-cell 2/1

User Association Problem 5m0849 WLAN Mobile devices can connect to dlink-nju Secured (WeS available) 0 multiple basestations Hiwif611 Open Basestations provide different Node2 Open service qualities OpenWrt_5.1 Coen Traditional approach SuperMan Secured (WPS available) 名 strongest signal wlantest lowest price Cpen (WPS available) highest transmission rate wlantest5G Open (WPS avarahle) Xiaomi_4CB9 Scan WLAN Direct 日+①4三1字卡2分QC 3/1
User Association Problem • Mobile devices can connect to multiple basestations • Basestations provide different service qualities • Traditional approach - strongest signal - lowest price - highest transmission rate 3/1

Problems for Existing Approaches Scenarios of suboptimal solutions 1M femto A ●For the user overly crowded basestations .For the carrier low utilization of femto-cells overload of marco-cells femto B 口,01三13卡至QC 4/1
Problems for Existing Approaches Scenarios of suboptimal solutions • For the user - overly crowded basestations • For the carrier - low utilization of femto-cells - overload of marco-cells femto A femto B 1M 1M 1M 1M 4 M 4/1

Problems for Existing Approaches Scenarios of suboptimal solutions 1.3M 1.3M femto A ●For the user -overly crowded basestations .For the carrier low utilization of femto-cells 2M overload of marco-cells femto B 日,+司1三13卡三分Q0 4/1
Problems for Existing Approaches Scenarios of suboptimal solutions • For the user - overly crowded basestations • For the carrier - low utilization of femto-cells - overload of marco-cells femto A femto B 1.3M 2M 1!"M 1.3M 2 M 4/1

Problems for Existing Approaches Associate to Cannot connect Scenarios of suboptimal solutions to BS A due to macro-cell resource constraints For the user 1M -overly crowded basestations 。For the carrier low utilization of femto-cells overload of marco-cells emto B 4/1
Problems for Existing Approaches Scenarios of suboptimal solutions • For the user - overly crowded basestations • For the carrier - low utilization of femto-cells - overload of marco-cells femto A femto B 1M 1.3 M 1M 1M 1.3 M Cannot connect to BS A due to resource constraints 1M Associate to macro-cell 1.3 M 4/1

Problems for Existing Approaches Scenarios of suboptimal solutions ●For the user 1M 1M -overly crowded basestations 。For the carrier -low utilization of femto-cells overload of marco-cells femto B 日,+司1三13卡三分Q0 4/1
Problems for Existing Approaches Scenarios of suboptimal solutions • For the user - overly crowded basestations • For the carrier - low utilization of femto-cells - overload of marco-cells femto A femto B 1M 1 M 1M 1M 1 M Cannot connect to BS A due to resource constraints 1M Associate to macro-cell 1M 1M 4/1

Randomly Deployed Network 70 60 50 40 30 20 10 VI 10 203040 50 60 meters An example for randomly deployed network 5/1
Randomly Deployed Network 0 10 20 30 40 50 60 70 0 10 20 30 40 50 60 70 meters meters An example for randomly deployed network 5/1

Randomly Deployed Network 70 60 50 40 30 20 10 203040 40 60 70 meters “orphan nodes'"20%→5% 日+回1三1交非三勺QG 5/1
Randomly Deployed Network 0 10 20 30 40 40 60 70 0 10 20 30 40 50 60 70 meters meters “orphan nodes” 20% → 5% 5/1

Key Challenges Misaligned objectives for users and network operators Users want better throughput Operators want better resource utilization Both the femto-cells and the users are randomly distributed Require a global view to fully optimize the system Mobile devices move all the time One device usually only associates with one basestation 日14回”1三”11至分风C 6/1
Key Challenges • Misaligned objectives for users and network operators - Users want better throughput - Operators want better resource utilization • Both the femto-cells and the users are randomly distributed • Require a global view to fully optimize the system • Mobile devices move all the time • One device usually only associates with one basestation 6/1
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 计算机科学与技术(参考文献)WiTrace - Centimeter-Level Passive Gesture Tracking Using OFDM signals.pdf
- 计算机科学与技术(参考文献)Femto-Matching - Efficient Traffic Offloading in Heterogeneous Cellular Networks.pdf
- 计算机科学与技术(参考文献)Opportunistic Energy-Efficient Contact Probing in Delay-Tolerant Applications.pdf
- 计算机科学与技术(参考文献)Wireless Charger Placement and Power Allocation for Maximizing Charging Quality.pdf
- 计算机科学与技术(参考文献)Optimizing Itinerary Selection and Charging Association for Mobile Chargers.pdf
- 计算机科学与技术(参考文献)Efficient Data Center Flow Scheduling Without Starvation Using Expansion Ratio.pdf
- 计算机科学与技术(参考文献)MobiCache - Cellular traffic offloading leveraging cooperative caching in mobile social networks.pdf
- 计算机科学与技术(参考文献)Burstiness-Aware Resource Reservation for Server Consolidation in Computing Clouds.pdf
- 计算机科学与技术(参考文献)Virtual Network Embedding with Opportunistic Resource Sharing.pdf
- 计算机科学与技术(参考文献)P3 - Joint Optimization of Charger Placement and Power Allocation for Wireless Power Transfer.pdf
- 计算机科学与技术(参考文献)An Opportunistic Resource Sharing and Topology-Aware Mapping Framework for Virtual Networks.pdf
- 南京大学:《软件工程研究导引 Introduction to Software Engineering Research》课程教学资源(课件讲稿)09 The TEX Typesetting System.pdf
- 南京大学:《软件工程研究导引 Introduction to Software Engineering Research》课程教学资源(课件讲稿)07 Tracing, Profiling, and Dynamic Program Analysis.pdf
- 南京大学:《软件工程研究导引 Introduction to Software Engineering Research》课程教学资源(课件讲稿)06 Static Program Analysis.pdf
- 南京大学:《软件工程研究导引 Introduction to Software Engineering Research》课程教学资源(课件讲稿)04 Conduct Rigorous and Scientific Research.pdf
- 《中国科学》:可成长软件理论方法和实现技术——从范型到跨越.pdf
- 计算机科学与技术(参考文献)Synthesizing Object State Transformers for Dynamic Software Updates.pdf
- 南京大学:《编译原理 Principles and Techniques of Compilers》课程教学电子教案(课件讲稿,2023)第三章 词法分析.pdf
- 南京大学:《编译原理 Principles and Techniques of Compilers》课程教学电子教案(课件讲稿,2023)第一章 引论(许畅).pdf
- 计算机科学与技术(参考文献)Pores-Preserving Face Cleaning Based on Improved Empirical Mode Decomposition.pdf
- 计算机科学与技术(参考文献)Understanding and Modeling of WiFi Signal Based Human Activity Recognition.pdf
- 计算机科学与技术(参考文献)Understanding and Modeling of WiFi Signal Based Human Activity Recognition.pdf
- 计算机科学与技术(参考文献)Keystroke Recognition Using WiFi Signals.pdf
- 计算机科学与技术(参考文献)Depth Aware Finger Tapping on Virtual Display.pdf
- 计算机科学与技术(参考文献)Device-Free Gesture Tracking Using Acoustic Signals.pdf
- 计算机科学与技术(参考文献)Device-Free Gesture Tracking Using Acoustic Signals.pdf
- 计算机科学与技术(参考文献)Depth Aware Finger Tapping on Virtual Displays.pdf
- 计算机科学与技术(参考文献)Gait Recognition Using WiFi Signals.pdf
- 计算机科学与技术(参考文献)Gait Recognition Using WiFi Signals.pdf
- 计算机科学与技术(PPT讲稿)QGesture - Quantifying Gesture Distance and Direction with WiFi Signals.pptx
- 计算机科学与技术(参考文献)QGesture - Quantifying Gesture Distance and Direction with WiFi Signals.pdf
- 计算机科学与技术(参考文献)Unlock with Your Heart:Heartbeat-based Authentication on Commercial Mobile Phones.pdf
- 计算机科学与技术(参考文献)SpiderMon - Towards Using Cell Towers as Illuminating Sources for Keystroke Monitoring.pdf
- 计算机科学与技术(参考文献)Dynamic Speed Warping - Similarity-Based One-shot Learning for Device-free Gesture Signals.pdf
- 计算机科学与技术(参考文献)RespTracker - Multi-user Room-scale Respiration Tracking with Commercial Acoustic Devices.pdf
- 计算机科学与技术(参考文献)VSkin - Sensing Touch Gestures on Surfaces of Mobile Devices Using Acoustic Signals.pdf
- 计算机科学与技术(参考文献)VECTOR - Velocity Based Temperature-field Monitoring with Distributed Acoustic Devices.pdf
- 计算机科学与技术(PPT讲稿)Unlock with Your Heart - Heartbeat-based Authentication on Commercial Mobile Phones.pptx
- 电子科技大学:《大数据分析与挖掘 Big Data Analysis and Mining》课程教学资源(课件讲稿)Lecture 1 Intro(主讲:邵俊明).pdf
- 电子科技大学:《大数据分析与挖掘 Big Data Analysis and Mining》课程教学资源(课件讲稿)Lecture 2 BasicConcepts(Foundations of Data Mining).pdf