Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation

Yi Ren, Chih Wei Tung, Jyh-Cheng Chen*, Frank Y. Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

IP flow mobility (IFOM) enables a user equipment to offload data traffic at the IP flow level. Although the procedure of IFOM-based flow offloading has been specified by 3GPP, how many IP flows should be offloaded and when offloading should be performed are not defined. Consequently, IP flows may be routed to a target access network that has a strong signal strength but with backhaul congestion or insufficient access capability. In this paper, we propose two algorithms, referred to as proportional offloading (PO) and proportional and preemption-enabled offloading (PPO), respectively, for IP flow offloading in hybrid cellular and wireless local area networks. The PO algorithm decides an optimal proportion of IP flows, which could be offloaded by considering available resources at the target access network. In the PPO algorithm, both service continuity and network utilization are taken into consideration. Furthermore, a detailed analytical model is developed in order to evaluate the behavior of the proposed algorithms. The analytical model is validated through extensive simulations. The results show that by dynamically adjusting the percentage of traffic flows to be offloaded, PO can reduce blocking probability and increase resource utilization. PPO further improves the performance at the cost of slightly higher offloading overhead.

Original languageEnglish
Article number8477134
Pages (from-to)12095-12108
Number of pages14
JournalIEEE Transactions on Vehicular Technology
Volume67
Issue number12
DOIs
StatePublished - 1 Jan 2018

Keywords

  • Mobility management
  • offloading in cellular networks
  • performance analysis

Fingerprint Dive into the research topics of 'Proportional and Preemption-Enabled Traffic Offloading for IP Flow Mobility: Algorithms and Performance Evaluation'. Together they form a unique fingerprint.

Cite this