Context-awareness over transient cloud in D2D networks: energy performance analysis and evaluation
نویسندگان
چکیده
The exponential increase in the number and types of mobile devices, along with their ever-growing sets of capabilities, have enabled the development of new architectures that aim to harness such heterogeneity. Transient clouds are examples of mobile clouds, which are created on-the-fly by the devices present in an environment to share their physical resources (e.g. CPU, memory and network) and would disappear as the nodes leave the network. They enable a device to go beyond its own physical limitations through utilising the capabilities offered by nearby devices over an ad hoc network. This idea exploits the device-to-device (D2D) communications paradigm, which allows two nearby devices to communicate with each other in the licenced cellular bandwidth without a base station involved. In this paper, we present a transient context-aware cloud (TCAC) paradigm based on the assumption that the nodes of the network care more about providing/learning higher level functionalities rather than lower level capabilities in D2D scenario. The proposed architecture, realised by using a WiFi Direct, can be portable through any paradigm, which exploits the D2D communications, so opening the doors to forthcoming 5G scenarios. We present a prototype implementation of our architecture over Android smartphones connected via WiFi Direct along with the performance metrics (power/energy consumption and accuracy) to show the benefits of TCAC. A theoretical and analytical model for the energy consumption related to a device within the TCAC is provided as well. Copyright © 2015 John Wiley & Sons, Ltd. *Correspondence A. Sciarrone, University of Genoa, Via dell’Opera Pia 13, 16145 Genoa, Italy. E-mail: [email protected] Received 29 June 2015; Revised 6 October 2015; Accepted 20 October 2015
منابع مشابه
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks
Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...
متن کاملOptimal Context Aware Transmission Strategy for non-Orthogonal D2D Communications
The increasing traffic demand in cellular networks has recently led to the investigation of new strategies to save precious resources like spectrum and energy. A possible solution employs direct deviceto-device (D2D) communications, which is particularly promising when the two terminals involved in the communications are located in close proximity. The D2D communications should coexist with oth...
متن کاملNext Generation Wearable Devices: Smart Health Monitoring Device and Smart Sousveillance Hat using D2D Communications in LTE Assisted Networks
The next generation wearable devices are Smart health monitoring device and Smart sousveillance hat which are capable of using wearable sensors for measuring physiological information, sousveillanace, navigation, as well as smart device to smart device communications over cellular coverage. Smart health monitoring device collect and observe different health related information deploying biosens...
متن کاملEvaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks
The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...
متن کاملDoS-Resistant Attribute-Based Encryption in Mobile Cloud Computing with Revocation
Security and privacy are very important challenges for outsourced private data over cloud storages. By taking Attribute-Based Encryption (ABE) for Access Control (AC) purpose we use fine-grained AC over cloud storage. In this paper, we extend previous Ciphertext Policy ABE (CP-ABE) schemes especially for mobile and resource-constrained devices in a cloud computing environment in two aspects, a ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Trans. Emerging Telecommunications Technologies
دوره 28 شماره
صفحات -
تاریخ انتشار 2017