An efficient traffic detouring method by using device-to-device communication technologies in heterogeneous network

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

13 Citations (Scopus)

Abstract

In recent years, HETerogeneous NETworks (HET-NET) arises as a promising network technique to manage a large number of mobile devices. By using the networks having different coverage size in the HETNET, it enables to increase the network capacity drastically. However, sometimes variations in user distribution causes inhomogeneous traffic load among the networks having different coverage size in the HETNET. On the other hand, Device-to-Device (D2D) communication technologies have attracted much attention as another solution to increase the network capacity. The direct communication between user devices creates flexible networks. Thus, we focus on utilizing D2D communication technologies in HETNET to avoid the inhomogeneous load among the networks having different coverage size. In this paper, a traffic detouring method is proposed and the advantage of the proposed method is analyzed with some mathematical expressions. Additionally, numerical results demonstrate the effectiveness of our proposal.

Original languageEnglish
Title of host publicationIEEE Wireless Communications and Networking Conference, WCNC
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages2162-2167
Number of pages6
ISBN (Electronic)9781479930838
DOIs
Publication statusPublished - 2016 Apr 3
Event2014 IEEE Wireless Communications and Networking Conference, WCNC 2014 - Istanbul, Turkey
Duration: 2014 Apr 62014 Apr 9

Publication series

NameIEEE Wireless Communications and Networking Conference, WCNC
ISSN (Print)1525-3511

Conference

Conference2014 IEEE Wireless Communications and Networking Conference, WCNC 2014
Country/TerritoryTurkey
CityIstanbul
Period14/4/614/4/9

Fingerprint

Dive into the research topics of 'An efficient traffic detouring method by using device-to-device communication technologies in heterogeneous network'. Together they form a unique fingerprint.

Cite this