Fact-checked by Grok 2 weeks ago

Mobile data offloading

Mobile data offloading refers to the technique of diverting mobile data traffic from congested cellular networks to complementary wireless access networks or direct device communications, thereby reducing base station load, optimizing resource utilization, and enhancing overall network efficiency. This approach addresses the exponential growth in mobile data demand driven by smartphones, IoT devices, and emerging applications like IoE and IoMT, which has led to severe network congestion and degraded quality of service (QoS). By leveraging unlicensed spectrum and opportunistic connections, offloading minimizes capital and operational expenditures for operators while improving user quality of experience (QoE). The primary motivations for mobile data offloading stem from massive traffic surges, with over 5.6 billion unique mobile subscribers as of 2024 and total subscriptions exceeding 8.8 billion, alongside rapidly multiplying data volumes due to in wireless networks. Key benefits include lower for devices and networks, cost-effective without extensive cellular upgrades, and support for delay-tolerant applications through alternative paths. However, challenges such as seamless , in heterogeneous environments, and economic incentives for participation persist, influencing the evolution of offloading strategies. As of mid-2025, 5G subscriptions have reached 2.6 billion, underscoring the continued need for offloading amid this growth. Common techniques encompass offloading, where traffic shifts to access points in unlicensed bands; small cell networks (SCNs) using low-power base stations like femtocells and picocells for localized coverage; device-to-device (D2D) communications enabling direct ; and vehicular ad-hoc networks (VANETs) for scenarios involving vehicle-to-vehicle (V2V) or vehicle-to-infrastructure (V2I) links. These methods are categorized by factors like delay tolerance (real-time vs. opportunistic), decision-making entities (operator-driven, user-centric, or hybrid), and infrastructure dependency (centralized vs. distributed). Ongoing research focuses on integrating / architectures, AI-driven optimization, and green networking to further advance offloading efficacy.

Background and Motivation

Mobile Data Surge

Global mobile data traffic has grown exponentially since 2010, driven by technological advancements and changing user behaviors. In 2010, worldwide mobile data consumption totaled 0.237 exabytes (EB) per month. By 2015, this figure had surged to 3.7 EB per month, marking a 26-fold increase. The growth continued rapidly, reaching 19.01 EB per month in 2018 and 77.5 EB per month by 2022 according to Cisco forecasts. By Q2 2025, monthly global mobile data traffic had climbed to 180 EB, reflecting over a 750-fold increase from 2010 levels. This trajectory aligns with projections from the Cisco Annual Internet Report (2018–2023), which anticipated substantial expansion, including around 4.8 zettabytes annually by 2022 when accounting for broader IP traffic trends influenced by mobile usage. Key factors fueling this surge include the widespread adoption of , which exceeded 6.7 billion units by 2023, and the proliferation of data-intensive applications. streaming, such as content on platforms like and , now constitutes about 74% of mobile traffic. usage, cloud services for storage and computing, and the emergence of (IoT) devices have further amplified demand. The rollout of networks has enabled higher speeds and lower , encouraging even greater consumption. Average per-user data usage illustrates this shift: smartphone users consumed roughly 1.8 GB per month in 2015, but this rose to 23 GB per month by 2025. This rapid expansion has imposed considerable strain on cellular networks worldwide. Limited available has led to capacity constraints, causing base station overload and during peak hours. Increased data demands have resulted in higher in underserved areas and elevated operational costs for mobile operators, including substantial capital expenditures (CAPEX) for deploying additional towers, , and spectrum acquisitions. These challenges underscore the need for innovative strategies to sustain amid ongoing growth.

Need for Data Offloading

Mobile data offloading refers to the process of transferring data traffic originally intended for cellular networks, such as or , to alternative networks utilizing unlicensed spectrum, like , or other local connections to alleviate congestion on licensed cellular infrastructure. This approach leverages complementary wireless technologies to redirect mobile data flows, thereby reducing the load on base stations and optimizing resource utilization in mobile networks. Economically, offloading provides significant cost savings for mobile network operators, as delivering data over cellular networks is substantially more expensive than over due to higher spectrum acquisition, infrastructure deployment, and maintenance expenses. For instance, cellular data transport can cost operators around $4 per , whereas offloading can drastically cut these expenses; one implementation achieved monthly savings exceeding $2 million by offloading substantial traffic volumes. These savings enable operators to manage escalating data demands without proportional capital investments in cellular capacity. In terms of performance, offloading enhances by enabling lower and higher throughput, particularly in densely populated areas where cellular networks face overload. By balancing loads across heterogeneous networks, it can reduce completion times for data transfers—for example, shortening video message delivery from 9.4 minutes on cellular to 3 minutes via delayed Wi-Fi offloading—while achieving end-to-end throughputs up to 6 Mbps. The concept emerged prominently in the early 2010s alongside the widespread rollout of and networks, driven by surging mobile data usage that strained existing infrastructure. A key milestone was 3GPP Release 8 in 2008, which introduced integration of non-3GPP access networks, such as , into the evolved packet core, laying the groundwork for standardized offloading mechanisms.

Wi-Fi Based Offloading

Cellular and Wi-Fi Network Interworking

Cellular and Wi-Fi network interworking refers to the architectural frameworks that enable seamless integration between cellular and (WLAN) technologies, primarily to facilitate mobile data offloading while maintaining service continuity. These frameworks, standardized by the (3GPP), address the need to leverage Wi-Fi's capacity to alleviate cellular network congestion without disrupting user sessions. Core architectures are broadly classified into and tight coupling, each offering different levels of integration and control. In architectures, cellular and networks operate independently, connected through external networks such as the , with decisions driven by policy-based mechanisms rather than deep . This approach requires minimal modifications to existing infrastructure, allowing networks managed by third-party providers (e.g., wireless service providers) to offload data via roaming agreements, but it typically lacks session continuity, leading to potential disruptions during transitions. Policy-based s rely on external signaling for , making it suitable for scenarios where the cellular operator has limited control over deployments. Tight coupling architectures, in contrast, integrate Wi-Fi more deeply by sharing the cellular core network, enabling centralized control over functions like authentication, billing, and handover. A key component is the Evolved Packet Data Gateway (ePDG), which serves as the entry point for untrusted Wi-Fi access into the Evolved Packet Core (EPC), using IPSec tunnels to secure data flows over the S2b interface. This setup allows for seamless mobility and operator-managed services, such as voice over Wi-Fi (VoWiFi), by treating Wi-Fi as an extension of the cellular access network. Key protocols underpin this interworking, with methods like EAP-SIM and EAP-AKA (or EAP-AKA') leveraging credentials for secure user authentication over , as specified in TS 33.402. For secure offloading in untrusted non- access (e.g., public hotspots), tunnels establish encrypted connections from the () to the ePDG, ensuring and . Trusted non- access, such as operator-controlled , bypasses the ePDG and connects directly to the Packet Data Network Gateway (PGW) via the S2a interface, often using GTP or PMIPv6 for mobility. These distinctions—trusted versus untrusted—determine the level of security and integration, with untrusted paths prioritizing tunneling to mitigate risks from external . The evolution of these interworking models traces from 4G in the , where VoWiFi was introduced in Release 11 to enable IMS-based voice services over using EAP and . Subsequent releases enhanced trusted access with SIM-based offload to the . In , Release 16 (finalized in 2020) advanced integration through non-3GPP access enhancements, including the Network Exposure Function (NEF) for better policy control and support for integrated access and backhaul (IAB) concepts to extend coverage, though primarily focused on New Radio (NR) with convergence via multi-access protocols. This progression has shifted from siloed networks to unified architectures supporting diverse services like ultra-reliable low-latency communications over hybrid access. Despite these advancements, interworking faces significant challenges, including maintaining IP address continuity during transitions to prevent session breaks, which is addressed through mechanisms like GTP tunneling but remains complex in scenarios. (QoS) mapping poses another hurdle, requiring translation from evolved packet system () bearers to access categories (ACs) under IEEE 802.11e, often resulting in inconsistent performance for applications. Vertical handovers between cellular and introduce latency and potential , exacerbated by ping-pong effects, necessitating thresholds and signaling to ensure seamless mobility without service degradation.

Initiation of Offloading Procedures

The initiation of offloading procedures in mobile data offloading is driven by a set of predefined triggers that detect conditions favorable for shifting traffic from cellular to networks. Signal strength thresholds, such as a (RSSI) exceeding -70 dBm for , signal adequate coverage and reliability to initiate evaluation for offloading, ensuring minimal disruption to ongoing sessions. Load-based triggers activate when utilization exceeds 80%, prompting redistribution to underutilized resources to mitigate congestion in high-density areas. User preferences, including manual overrides or predefined rules for specific applications, and time-of-day policies that favor offloading during peak cellular usage hours, further refine these triggers to align with individual or operator-defined priorities. Decision algorithms process these triggers to determine offloading feasibility, balancing factors like network quality and user context. Rule-based algorithms rely on straightforward if-then policies; for example, offloading commences if the (SNR) surpasses a minimum adjusted dynamically for current load, as in schemes where access is granted only if \text{SNR}_{\text{Wi-Fi AP}} \geq \text{SNR}_{\min} + \text{Load factor}. Machine learning-driven approaches, conversely, enhance accuracy by predicting user patterns from historical data, such as trajectory forecasts using classification models to anticipate encounters with Wi-Fi access points and preemptively initiate . These predictive models, often trained on urban mobility traces, outperform static rules by up to 20-30% in offloading efficiency during dynamic movement. Once a decision favors offloading, the procedures unfold in a structured sequence: the association phase begins with scanning and discovery of nearby Wi-Fi networks, where devices probe for available access points based on broadcast beacons. Authentication follows, typically via Extensible Authentication Protocol (EAP) methods like EAP-SIM for SIM-based verification, ensuring secure linkage to the user's cellular credentials without manual input. IP session setup then occurs, assigning a new IP address or maintaining continuity through protocols like Proxy Mobile IPv6 to bind flows seamlessly. Hotspot 2.0 (also known as Passpoint), built on IEEE 802.11u, streamlines this by automating discovery and authentication, allowing devices to connect transparently upon entering range, thus reducing initiation latency to under 500 ms in compatible deployments. The handover initiation process can be represented as a sequential flowchart:
Monitor Triggers
    ↓ (If signal/load/user policy met)
Evaluate Decision Algorithm (Rule-based or ML prediction)
    ↓ (If offload viable)
Scan and Discover Wi-Fi APs
Authenticate (E.g., EAP-SIM via Hotspot 2.0)
Setup IP Session and Route Traffic
Complete Offload
This flow ensures orderly transition, with each step gated to prevent premature or unstable handovers. Evaluation of these procedures often centers on the offload ratio, the percentage of total diverted to , which typically targets 30-50% in urban deployments to achieve substantial cellular relief while maintaining . In real-world traces from dense cities like , such ratios have been observed to reduce 3G by up to 50% under optimal conditions, highlighting the procedures' impact on network scalability.

Access Network Discovery and Selection Function (ANDSF)

The Access Network Discovery and Selection Function (ANDSF) is a server-based entity within the evolved packet core () designed to assist () in discovering non- access networks, such as , and selecting them for data offloading from cellular networks. It provides UEs with operator-defined policies and information on available access networks, enabling intelligent decisions to optimize traffic distribution and reduce congestion on primary cellular links. By centralizing control at the network side, ANDSF allows operators to enforce preferences based on factors like network load, , and requirements, thereby enhancing overall system efficiency in heterogeneous environments. Introduced in 3GPP Release 8 in 2008, ANDSF established a foundational framework for inter-system , specifying procedures for non-3GPP access integration into the . Subsequent enhancements in Release 12, completed in 2014, improved its capabilities for WLAN interworking, including refined policy rules for selecting among WLAN networks and access points to support trusted deployments. These updates addressed growing demands for seamless offloading in dense urban scenarios, aligning with broader efforts to densify networks and incorporate unlicensed spectrum usage. The core components of ANDSF include the ANDSF server hosted in the operator's core network, a corresponding client implemented on the , and policy rules structured as XML-based management objects (MOs). These MOs are delivered to the via the Open Mobile Alliance Device Management (OMA-DM) protocol over the S14 reference point, allowing secure and standardized configuration updates. Policy rules encompass inter-system mobility , which prioritize access networks based on criteria like validity time and roaming partners, as well as discovery information listing available networks with their capabilities. Examples include location-based rules that direct offload within designated venues, such as stadiums or enterprise campuses, and time-based preferences that favor offloading during peak cellular usage hours to balance load. For network discovery, ANDSF operates in two primary modes: query mode, where the UE initiates a pull request to retrieve current policies and lists from the server, and push mode, where the server proactively notifies the UE of updates via mechanisms like Push over accesses. This dual-mode approach ensures flexibility, with query mode suitable for on-demand scenarios and push mode ideal for dynamic policy propagation without UE intervention. ANDSF also integrates with Hotspot 2.0 (Passpoint) specifications, enabling UEs to leverage Query (ANQP) queries for querying detailed attributes of networks, such as operator identifiers and consortiums, before selection. This integration, advanced in Release 12, facilitates automated discovery in public hotspots while maintaining operator oversight. Notable deployments in the 2010s included operator implementations of ANDSF for offloading in urban environments, contributing to traffic reductions in high-density areas.

Access Traffic Steering, Switching and Splitting (ATSSS)

Access Traffic Steering, Switching and Splitting (ATSSS) is a key feature introduced in Release 16 in 2019 as part of the system architecture, designed to enable dynamic management of user plane traffic across multiple access networks. It supports steering (initial route selection for traffic flows), switching (seamless between accesses), and splitting (simultaneous use of multiple paths for a single flow) for multi-access (PDU) sessions between accesses (such as or ) and non- accesses (such as ). This functionality allows (UE) and the network to optimize traffic distribution based on real-time conditions, enhancing overall connectivity reliability and efficiency in heterogeneous environments. ATSSS operates through a set of standardized rules and protocols to manage traffic flows, with the UE and network elements like the Session Management Function (SMF) and User Plane Function (UPF) coordinating decisions. For steering and switching, rule-based mechanisms evaluate criteria such as access performance (e.g., signal quality, load), application requirements, or operator policies to select or transfer flows between accesses. Splitting is primarily achieved using Multipath TCP (MPTCP) for TCP-based traffic, where the UE and a proxy at the UPF aggregate subflows over 3GPP and non-3GPP paths, enabling combined throughput from disparate links like LTE and Wi-Fi. Additionally, ATSSS Low Layer (ATSSS-LL) supports Ethernet traffic splitting without MPTCP, using packet duplication or load balancing at lower layers. These mechanisms ensure backward compatibility with 4G LTE by allowing non-3GPP interworking in multi-access scenarios. Steering decisions in ATSSS are governed by traffic steering rules provisioned by the network, which specify modes like active-standby (primary access with failover), smallest round-trip time (RTT) first, or load sharing. A representative pseudo-code for a basic rule-based steering decision, derived from 3GPP-specified modes, illustrates how the UE or UPF might evaluate and select an access:
function steerTraffic(flow) {
  if (flow.steeringMode == "smallest_RTT") {
    access = selectAccessWithMinRTT(availableAccesses);
  } else if (flow.steeringMode == "load_sharing") {
    access = selectAccessWithLowestLoad(availableAccesses);
  } else if (flow.steeringMode == "priority_based") {
    access = selectHighestPriorityAccess(flow.appType, availableAccesses);
  }
  routeFlow(flow, access);
  return access;
}
This logic prioritizes access selection based on the configured mode, with measurements like RTT or load obtained from lower layers. For splitting, MPTCP extends this by distributing packets across selected paths according to subflow weights. Performance evaluations of ATSSS demonstrate significant gains, particularly through splitting, where aggregating and links can achieve up to 2x throughput improvement in balanced scenarios by combining bandwidths, while reducing via optimal steering. For instance, MPTCP-based splitting has shown throughput increases of over 70% in intermittent conditions when paired with cellular. The framework maintains compatibility with legacy deployments by supporting non-3GPP access integration without requiring full upgrades. Deployment of ATSSS began with early 5G trials around , focusing on multi-access convergence in lab and field tests by equipment vendors and research consortia. As of , ATSSS continues to evolve with Release 18 enhancements for AI-driven steering and 7 support, enabling higher throughput offloading in dense environments, with ongoing PoCs by vendors and operators, particularly for ultra-reliable low-latency communication (URLLC) applications such as industrial automation and mission-critical services, leveraging its multipath capabilities for enhanced reliability.

Operating System Connection Managers

Operating system connection managers play a crucial role in mobile offloading by intelligently selecting and switching between and cellular networks at the device level to optimize usage, performance, and battery life. In , the Assistant feature, initially exclusive to Project Fi users and rolled out to all devices in 2016, automatically connects to known open networks while securing the via a Google-provided VPN to prevent interception. This enables seamless offloading of traffic from cellular to , reducing mobile consumption without compromising . Later enhancements, such as Adaptive introduced in 9 () and refined in subsequent versions, use device learning to evaluate network quality based on usage patterns and requirements, automatically switching to a better available network or avoiding poor connections for background tasks. Apple's implements Assist, introduced in in 2015 and enabled by default, which prioritizes for transfer but seamlessly falls back to cellular when detecting a weak or unreliable signal to maintain connectivity. This feature applies primarily to foreground app like web browsing and streaming, helping users save on cellular costs while minimizing interruptions, though it can slightly increase overall usage if is frequently suboptimal. Regarding , iOS connection managers prompt users before joining new networks and limit background , ensuring offloading decisions do not expose personal information without consent. Modern OS connection managers incorporate predictive algorithms, often leveraging , to assess connection quality and offload traffic efficiently. For instance, Android's ConnectivityManager uses models to predict based on historical data, signal strength, and app needs, avoiding low-quality to prevent unnecessary battery drain during offloading. These models integrate with carrier-specific settings, allowing customized offload policies that balance data costs and reliability. Similarly, iOS employs and learning-based evaluations to determine fallback thresholds, prioritizing for cost savings while adapting to user behavior over time. Vendor-specific implementations further enhance OS-level offloading. Samsung's Intelligent , available on devices running , automates network switching using geofencing and usage patterns to connect to trusted hotspots proactively, reducing reliance on cellular data and conserving battery by minimizing unnecessary scans. Qualcomm's FastConnect subsystems, integrated into many chipsets, optimize at the level with AI-driven and power modes, achieving over 25% reduction in subsystem power consumption during offloading scenarios, which translates to 15-25% overall battery savings in mixed network use.

Opportunistic Offloading

Core Principles

Opportunistic mobile data offloading refers to the process of delaying or rerouting non-real-time traffic from cellular networks to exploit transient connectivity opportunities, such as brief encounters with public hotspots or scheduled delayed transfers via alternative paths. This approach targets elastic data like emails, software updates, or cached content that can tolerate postponement, thereby reducing the load on expensive cellular without compromising for time-sensitive applications. Unlike persistent integration, which relies on continuous dual-network access, opportunistic offloading leverages intermittent, unplanned connections to achieve cost-effective traffic diversion. The core principles of opportunistic offloading are rooted in (DTN), a designed for environments with intermittent where traditional end-to-end protocols fail. In DTN, data packets—known as bundles—are buffered at intermediate nodes until a suitable forwarding opportunity arises, such as a device's proximity to a access point or another opportunistic link. This store-carry-forward mechanism contrasts sharply with always-on offloading strategies, which prioritize immediate to available networks like , often at the expense of higher energy use or connection setup overhead; instead, DTN enables opportunistic methods to wait for "free" or low-cost windows, buffering traffic locally on the device until transmission is viable. Mathematical models for opportunistic offloading typically employ processes to predict user mobility and contact patterns, estimating when and where opportunities will occur. These models analyze traces of human movement, such as those from GPS , to compute probabilities of encountering s or peers, informing decisions on which to delay. A key performance metric is offloading efficiency, defined as the ratio of successfully offloaded to total eligible , often achieving over 90% success rates within a predefined delay of tens of minutes, depending on mobility density and coverage. For instance, in scenarios with moderate user density, simulations show that delaying non-urgent downloads by up to 30 minutes can offload 70-90% of cellular-bound via opportunistic . Historically, these principles draw from the Bundle Protocol specified in DTN's foundational RFC 5050, published in , which standardized bundle handling for disrupted networks. The application to mobile data offloading emerged in the early , with research adapting DTN concepts to real-world scenarios, using social and mobility patterns to enhance offloading viability. Early studies demonstrated practical feasibility by integrating DTN with opportunistic and peer contacts, paving the way for scalable traffic reduction in cellular infrastructures.

Implementation Approaches

Opportunistic offloading implementations often leverage crowdsourced hotspots, where users share their home or public access points to create a distributed for , reducing reliance on cellular infrastructure. For instance, platforms like Fon enable this by allowing subscribers to access a global pool of hotspots contributed by other users, which has been integrated into carrier such as Deutsche Telekom's to offload mobile traffic onto fixed-line , potentially diverting significant volumes from cellular bands. Another technique involves drive-thru offloading, exploiting brief connectivity opportunities during vehicle transit near roadside units or access points, allowing devices in moving cars to upload or download opportunistically without persistent connections. App-level buffering complements these by deferring non-urgent tasks, such as synchronization or software updates, until availability is detected, thereby tolerating delays to maximize offload efficiency in intermittent environments. Practical deployment relies on algorithms that optimize offloading under constraints. scheduling approaches prioritize transferring the largest pending items first when windows open, ensuring higher throughput within limited contact durations, as demonstrated in deadline-sensitive scenarios where this method achieves near-optimal offload ratios. Utility-based algorithms extend this by formulating offloading as an to maximize user satisfaction—balancing factors like completion time and energy use—subject to delay tolerances, often solved via programming to select subsets of transferable that yield the highest net benefit. These algorithms are typically evaluated using simulation tools like ns-3, which models vehicular and traces to assess offload in realistic settings, enabling iterative refinement before real-world testing. Real-world case studies illustrate these techniques' viability. In urban contexts, deployments leveraging public transit , such as those analyzed in high-density cities, have achieved up to 40% cellular offload by buffering and transferring during bus or subway rides, as seen in trace-driven evaluations of opportunistic vehicular networks. Integration with networks enhances opportunistic offloading through edge caching mechanisms introduced in Release 17 (finalized in 2022), which enable base stations and to prefetch and deliver content during opportunistic encounters, reducing for delay-tolerant applications while supporting multicast delivery in dynamic environments. This allows seamless of buffered data to edge nodes, aligning with core delay-tolerant principles by prioritizing utility under intermittent coverage. Recent advancements as of 2024-2025 incorporate for predicting mobility and contact opportunities, improving offloading decisions in dynamic environments, and exploring integrations with non-terrestrial networks for enhanced opportunistic coverage in remote or high-mobility scenarios.

Alternative Offloading Strategies

Small Cell and Femtocell Deployment

Small cells, including picocells and microcells, are low-power base stations designed to provide targeted indoor and outdoor coverage enhancements in cellular networks. These deployments enable mobile data offloading by shifting traffic from overburdened s to localized , particularly in dense urban environments where user concentrations are high. In such areas, can offload up to 56% of users, thereby offloading a significant portion of traffic, when deployed at a ratio of four per , improving overall network capacity without requiring extensive upgrades. The standardized support for integration in Release 10 (2011), introducing features like Local IP Access (LIPA) and Selected IP Traffic Offloading (SIPTO), facilitated seamless and traffic steering between macro and . Femtocells represent a subset of , functioning as user-deployed, low-power home base stations that operate on licensed spectrum to extend cellular coverage indoors. Unlike operator-managed picocells, femtocells are typically installed by end-users in residential or small office settings, connecting to the core network via backhaul such as DSL or . To mitigate interference in dense deployments, femtocells incorporate (SON) functionalities, which automate configuration, optimization, and maintenance, including dynamic to avoid co-channel conflicts with macrocells. These SON mechanisms, standardized in specifications, enable femtocells to self-adjust power levels and frequency usage, ensuring minimal disruption to the wider network. The primary advantages of small cell and femtocell deployments include improved coverage in signal dead zones and substantially higher data capacities, with LTE-based femtocells capable of delivering up to 100 Mbps downlink speeds in a 20 MHz bandwidth. By 2020, annual small cell shipments, including femtocells, reached approximately 5 million units globally, with the market continuing to grow and cumulative shipments projected to reach 61 million by 2030, reflecting widespread adoption to handle surging mobile data demands. However, challenges persist, particularly in backhaul connectivity, where small cells require reliable, high-capacity links—often 50 Mbps or more—to the core network, and spectrum management, addressed through techniques like carrier aggregation to combine multiple frequency bands efficiently.

Device-to-Device Communication

Device-to-device (D2D) communication facilitates mobile data offloading by enabling direct, infrastructure-free data exchange between proximate mobile devices, thereby alleviating cellular network congestion through local content dissemination. This approach relies on proximity detection and short-range wireless links to share data such as files, messages, or cached content in environments with limited or unreliable cellular coverage, including offline or disaster scenarios. Key enabling technologies include Bluetooth for low-power pairing, Wi-Fi Direct for peer-to-peer connections without access points, and the 3GPP sidelink interface introduced in Release 12 in 2014, initially targeted at public safety use cases to support direct communications during emergencies. In social offloading applications, D2D allows users to form ad-hoc mesh networks for collaborative data sharing, as demonstrated by the app during the , where and enabled protesters to exchange messages and logistical information amid network shutdowns and congestion. For vehicular networks, (V2X) communications leverage D2D sidelink in Release 16, standardized in 2020, to enable direct vehicle-to-vehicle data relay for real-time safety alerts, traffic coordination, and sensor data sharing, enhancing road efficiency without constant reliance on base stations. D2D protocols typically begin with device discovery using (BLE) scanning, where devices periodically broadcast beacons on three advertising channels to identify neighbors with minimal energy overhead, facilitating quick formation of communication groups. Data relay then occurs via multi-hop forwarding, often incorporating (TTL) limits on packets to cap propagation hops, prevent loops, and control resource usage in dynamic topologies. These mechanisms align with opportunistic offloading principles by exploiting transient contacts for efficient transfer. In group settings, such as crowds or convoys, D2D offloading yields significant energy savings by distributing data loads and reducing individual device transmissions. Early research milestones trace to DARPA's 2010s initiatives on mobile ad-hoc networks, which advanced scalable D2D concepts for resilient communications in contested environments, influencing subsequent standards development. By 2023, feasibility studies and pilots for NR-V2X emerged. As of 2025, initial commercial deployments and pilots are underway in regions like , , and other parts of , integrating sidelink for automotive applications, marking the transition from research prototypes to infrastructure-independent offloading.

Benefits and Challenges

Key Advantages

Mobile data offloading provides significant capacity relief to cellular networks by shifting traffic to alternative access technologies such as , thereby reducing the load on base stations and extending the overall lifespan of mobile infrastructure. A 2010 study indicated that offloading can handle up to 65% of total mobile data traffic in urban environments, effectively alleviating and allowing operators to delay costly acquisitions or network upgrades. A 2016 forecast from Cisco's Visual Networking Index projected that offloading would account for approximately 55% of mobile data traffic by 2020; more recent data as of 2024 shows handling nearly 90% of data traffic overall in the , contributing to substantial savings in capital expenditures for network expansion. From a cost-efficiency perspective, offloading enables mobile network operators to cut data delivery expenses by 50% or more through the use of lower-cost infrastructure compared to cellular . This reduction translates to more affordable pricing models for users, including unlimited data plans that avoid overage fees, as operators pass on savings from offloaded traffic. On the user side, seamless integration via operating system connection managers further optimizes costs by prioritizing free or low-cost networks automatically. Performance enhancements from offloading include improved and , particularly through multipath techniques like those in ATSSS, which can aggregate and cellular paths for better end-to-end performance in hybrid access scenarios. Additionally, offloading saves up to 55% of device battery power by minimizing reliance on energy-intensive cellular radios, with OS-level managers providing further gains through selection. Environmentally, offloading reduces at cellular s by diverting traffic, aligning with green networking objectives; for instance, 's lower power profile per bit transmitted can decrease overall network energy use by optimizing load distribution and enabling sleep modes during off-peak offloaded periods.

Limitations and Future Directions

Despite its advantages, mobile data offloading faces several limitations that hinder widespread adoption and reliability. Security risks are prominent, particularly with opportunistic use of open networks, which often lack and are vulnerable to , man-in-the-middle attacks via rogue points, and unauthorized due to absent or weak mechanisms. Inconsistent coverage further exacerbates issues, as deployment struggles with outdoor environments and regulatory power limits, leading to unreliable offloading where users remain connected to weak signals, resulting in quality-of-service degradation in urban deployments. Regulatory hurdles also pose challenges, especially in spectrum sharing, where complex frameworks, uncertain access due to detection, and insufficient economic incentives for sharing complicate implementation and may degrade in dynamic environments. issues compound these problems, including across operating systems and standards that restricts seamless integration of offloading solutions, while frequent network switching incurs energy overhead on devices, increasing battery drain without proportional performance gains. Looking ahead, future directions emphasize AI-driven predictive offloading to optimize decisions in real-time, aligning with the vision of AI-native networks by 2030 that integrate communication, , and sensing for proactive . with satellite systems, such as low-Earth orbit constellations like , has enabled hybrid terrestrial-satellite offloading as of 2025 through partnerships like 's rollout, providing wide-area coverage and for remote scenarios via cooperative for task allocation. emerges as a key enabler for secure device-to-device (D2D) offloading in , providing decentralized and trust mechanisms to mitigate vulnerabilities in heterogeneous networks. Post-2020 developments highlight research gaps in evolving from 4G-focused approaches to and , which enable customized for offloading but require advanced to address in beyond-5G ecosystems.

References

  1. [1]
    Data Offloading Techniques in Cellular Networks: A Survey
    **Summary of https://ieeexplore.ieee.org/document/6953022**
  2. [2]
    A comprehensive analysis of mobile data offloading techniques ...
    This paper presents offloading through a diverse range of technologies such as data offloading through Small Cell Networks (SCNs), Wi-Fi offloading, Device-to- ...
  3. [3]
    An Era of Mobile Data Offloading Opportunities - ResearchGate
    Feb 22, 2023 · Besides, we present the timeline analysis of the mobile data offloading strategies by discussing their pros and cons for their application in ...Missing: scholarly | Show results with:scholarly
  4. [4]
    Cisco Visual Networking Index Forecast Projects 26-Fold Growth in ...
    Feb 1, 2011 · Read the complete Cisco VNI Mobile Data Traffic Forecast, 2010-2015; Learn more about free Cisco Global Internet Speed Test (GIST) application ...
  5. [5]
    Astounding Statistics for Mobile Data Growth - MD7
    In 2015 – Global mobile data traffic grew 1.7-fold, or 74%. By 2020 – Globally, mobile data traffic will grow 8-fold from 2015 to 2020, a compound annual ...Missing: Ericsson report<|control11|><|separator|>
  6. [6]
    Cisco Annual Internet Report (2018–2023) White Paper
    Globally, the top 1 percent of mobile users generated 5 percent of mobile data in 2019. Back in 2010, the top 1 percent of mobile users generated 52 percent of ...
  7. [7]
  8. [8]
    Mobile network traffic Q2 2025 – Ericsson Mobility Report
    Mobile network data traffic grew 19 percent between Q2 2024 and Q2 2025. Total monthly global mobile network data traffic reached 180 EB in Q2 2025.Missing: 2010-2025 Cisco GSMA
  9. [9]
    Ericsson Mobility Report | Read the latest edition
    The Ericsson Mobility Report offers industry-leading mobile coverage, subscriptions and traffic forecasts, plus 5G value insights for service providers.Mobility Reports · Mobility Visualizer · June 2025 · Data and forecasts
  10. [10]
    Mobile data traffic forecast – Ericsson Mobility Report
    Mobile network data traffic continues to grow, but with a declining year-on-year growth rate to 15 percent in 2030. This results in a CAGR of 17 percent over ...Missing: 2010-2025 | Show results with:2010-2025
  11. [11]
    Mobile Data Statistics 2025: Global Usage Trends & Consumption
    May 29, 2025 · In 2025, global mobile users are projected to surpass 7.49 billion. Mobile data is powering modern connectivity, from ultra-HD streaming to IoT-driven smart ...Missing: 2010-2025 Cisco
  12. [12]
    Global and regional key figures – Ericsson Mobility Report
    Data traffic per smartphone. 17, 19, 37, 11%, GB/month. Data traffic per mobile PC. 23, 26, 40, 8%, GB/month. Data traffic per tablet. 13, 16, 27, 10%, GB/month ...
  13. [13]
    [PDF] Mobile Services, Spectrum and Network Evolution to 2025
    Quantifying spectrum demand. In section 2, we examined the global growth in mobile data consumption and its impact network capacity requirements assuming ...
  14. [14]
    [PDF] The Impact of High Spectrum Costs on Mobile Network Investment ...
    May 1, 2017 · Similarly, Cambini and Garelli (2017)13 present evidence that spectrum availability and fees are not significantly correlated with mobile.
  15. [15]
    Expanding mobile wireless capacity: The challenges presented by ...
    This paper describes and quantifies the economic and technical challenges associated with deepening wireless networks to meet this growing demand.
  16. [16]
    [PDF] Data Offloading Techniques in Cellular Networks: A Survey - HAL
    In this section, we review the main strategies and provide a comprehensive categorization of existing solutions. It is important to pinpoint that mobile data ...
  17. [17]
    [PDF] Economics of Mobile Data Offloading
    Abstract— Mobile data offloading is a promising approach to alleviate network congestion and enhance quality of service (QoS) in mobile cellular networks.Missing: motivations | Show results with:motivations
  18. [18]
    Using Radiator for Wi-Fi offloading: how to make savings in mobile ...
    Nov 9, 2015 · If cost of each GByte to the EPC is around USD $4, the customer is saving over USD $2M per month - and over $24M per year! Amount of offloaded ...
  19. [19]
    What is WiFi Offloading Technology? | IO by HFCL Blog
    Feb 18, 2024 · Mobile data offloading is the use of WiFi hotspots to maintain connectivity for mobile devices. It occurs when a device shifts from a cellular ...Missing: definition | Show results with:definition
  20. [20]
    [PDF] Mobile Data Offloading: How Much Can WiFi Deliver? - Events
    This paper presents a quantitative study on the performance of 3G mobile data offloading through WiFi networks. We re- cruited about 100 iPhone users from ...
  21. [21]
    Trusted and Untrusted 3GPP Wi-Fi Access - Enea
    Jan 14, 2025 · Trusted non-3GPP (Wi-Fi) access was first introduced with the LTE standard in 3GPP Release 8 (2008). Trusted access typically refers to operator ...Missing: history | Show results with:history
  22. [22]
    [PDF] 2 4G Americas Integration of Cellular and Wi-Fi Networks ...
    Loosely coupled networks: In a loosely coupled network, the Wi-Fi network performance is usually not within the 3GPP operator's control, or has not been ...
  23. [23]
    [PDF] On Practical Aspects of Mobile Data Offloading to Wi-Fi Networks
    In loose coupling architecture, the networks are independent requiring no major cooperation between them. The Wi-Fi network is connected indirectly to the ...
  24. [24]
    [PDF] 5G and Wi-Fi RAN Convergence - Wireless Broadband Alliance
    The architecture for integrating Wi-Fi in the 3GPP 5G system is examined and some of the practical limitations of its implementation in the real world scenarios ...
  25. [25]
    [PDF] Optimized Wi-Fi Offloading Scheme for High User Density in LTE ...
    This algorithm triggers network offloading based on choosing the best SNR min value for WLAN APs. This algorithm may have a similar behavior to Wi-Fi if.Missing: preferences | Show results with:preferences
  26. [26]
    [PDF] A prediction-model-assisted reinforcement learning algorithm for ...
    As shown, the states of the RL algorithm are defined in terms of the current serving network k ∈ {LiFi, WiFi}, a prediction of the user trajectory, and the ...
  27. [27]
    [PDF] Enhancing Data Offloading in Urban Networks via Machine ...
    This paper introduces a Machine. Learning-based framework for predicting the next OR visited during user mobility. Using urban mobility traces from the city of ...
  28. [28]
    [PDF] Architecture for Mobile Data Offload over Wi-Fi Access Networks
    3GPP Release 8 (2008). Although most of today's offload designs are build on the trusted model, 3GPP does not currently offer guidance for integration with ...
  29. [29]
    [PDF] The MSP's guide to Wi-Fi offloading - Epitiro
    When a device is in range of a Wi-Fi access point configured for Hotspot 2.0, the connection seamlessly moves to Wi-Fi without the user experiencing visible.<|control11|><|separator|>
  30. [30]
    [PDF] Developments in 3GPP – Release 12 and beyond
    May 20, 2014 · Small Cell Enhancement in Release 12. Scenario 1 co-channel ... • ANDSF policies for selecting between WLAN NWs and APs. WiFi as trusted ...
  31. [31]
    [PDF] EXECUTIVE SUMMARY - Inside 3GPP Release 12 - 5G Americas
    The primary goal of Rel-12 is to provide mobile operators with new options for increasing capacity, extending battery life, reducing energy consumption at the ...<|control11|><|separator|>
  32. [32]
    [PDF] ETSI TS 124 312 V14.1.0 (2017-07)
    Jul 5, 2018 · ... OMA DM Device Description Framework (DDF) as described in the enabler release definition OMA-ERELD-DM-V1_2 [5]. The MOs consist of relevant ...Missing: components | Show results with:components
  33. [33]
    Verizon to offload EV-DO, LTE traffic onto Wi-Fi | Fierce Network
    May 20, 2011 · Verizon Wireless (NYSE:VZ) will use Wi-Fi offloading techniques to handle increased data traffic on its EV-DO and LTE networks in homes as well as crowded ...Missing: percentage high-<|control11|><|separator|>
  34. [34]
    What is Wi-Fi Offload - The Fast Mode
    It is all about relieving the congested mobile data networks with additional capacity from unlicensed Wi-Fi spectrum.
  35. [35]
    [PDF] ETSI TS 124 193 V16.2.0 (2021-01)
    The present document specifies the procedures for access traffic steering, switching and splitting (ATSSS) between the. UE and the network across one 3GPP ...
  36. [36]
    [PDF] 3GPP Access Traffic Steering Switching and Splitting (ATSSS) - IETF
    ○ Release 16 carries Ethernet (ATSSS-LL) and TCP traffic (MPTCP proxy). ○ Simultaneous use of multiple paths supported for TCP, but not Ethernet. ○ Release ...
  37. [37]
    Low-delay cost-aware multipath scheduling over dynamic links for ...
    By using an ATSSS proxy, (i) TCP flows may be split at the proxy and turned into Multipath TCP (MPTCP) [4] between the proxy and the user.
  38. [38]
    Multipath transmission control protocol–based multi-access traffic ...
    Feb 27, 2020 · Access traffic steering, switching, and splitting (ATSSS) is a traffic aggregation technology at the network level. It can easily expand ...
  39. [39]
    [PDF] Deliverable D5.3 Final 6G architectural enablers and ... - Hexa-X
    Aug 16, 2023 · We use the 3GPP Release 17 work item Access Traffic Steering, Switching, and Splitting (ATSSS) as a baseline for the proposed enhancements.
  40. [40]
    Wi-Fi infrastructure overview | Connectivity - Android Developers
    Intended for carrier Wi-Fi offload configuration apps and other apps that may actively manage offload networks. Network request API: targets apps that need ...
  41. [41]
    About Wi-Fi Assist - Apple Support
    Sep 16, 2024 · With iOS 9 and later, you can use Wi-Fi Assist to automatically switch to cellular when you have a poor Wi-Fi connection.
  42. [42]
    Wi-Fi Assistant now rolling out to all non-Project Fi Nexus devices
    Sep 9, 2016 · Just a couple of weeks ago Google revealed that a Project Fi exclusive feature would be making its way to all Nexus devices. Wi-Fi Assistant ...
  43. [43]
    Wi-Fi preferred network offload scanning
    Wi-Fi preferred network offload (PNO) scans are low-powered Wi-Fi scans that occur at regular intervals when a device is disconnected from Wi-Fi and the screen ...
  44. [44]
    Adaptive Wi-Fi offloading schemes in heterogeneous networks, the ...
    Many researchers have proposed the adaptive wireless fidelity (Wi-Fi) offloading (AAWO) algorithm to transfer data on heterogeneous networks. In this study, the ...
  45. [45]
    iOS 9's Wi-Fi Assist, fully explained and demystified - iDownloadBlog
    Oct 12, 2015 · How can I tell if Wi-Fi is active? When Wi-Fi Assist is enabled and iOS detects a poor Wi-Fi signal, the feature is automatically activated.
  46. [46]
    A Systematic Review of Wi-Fi and Machine Learning Integration with ...
    Jun 29, 2022 · The goal of this systematic review is to give a broader perspective on the applications of Machine Learning on Wi-Fi connection data. By ...
  47. [47]
    Machine learning-based computation offloading in multi-access ...
    This paper aims to provide a detailed but precise overview of the research on using ML techniques for MEC environments.
  48. [48]
    Intelligent Wi-Fi | Knox Platform for Enterprise
    Jul 26, 2023 · Samsung's original cell-based geofencing technique allows users to use Auto Wi-Fi without turning GPS on. Samsung's geofencing technique ...Missing: offloading | Show results with:offloading
  49. [49]
    How Qualcomm FastConnect 7700 is accelerating the Wi-Fi 7 ...
    Feb 18, 2025 · Learn how Qualcomm's FastConnect 7700 is accelerating Wi-Fi 7 adoption in mainstream smartphones, enhancing speed, latency and range.Missing: battery offloading
  50. [50]
    FastConnect 7900 - Qualcomm
    FastConnect 7900 is redesigned to a compact 6nm, packing all-new AI-optimized Wi-Fi 7 built for extreme power efficiency. New RF FEMs add additional power ...Missing: offloading | Show results with:offloading
  51. [51]
    Qualcomm Wi-Fi 7 Advances Boost Performance And Introduce Key ...
    Sep 20, 2023 · The devices are able to apply power savings modes between the bursts, which reduces the overall power of the wireless subsystem by more than 25 ...Missing: optimization | Show results with:optimization
  52. [52]
  53. [53]
    [PDF] Is it Worth to be Patient? Analysis and Optimization of Delayed ...
    In this paper, we propose a queueing analytic model for delayed offloading, and derive the mean delay, offloading efficiency, and other metrics of interest, as ...
  54. [54]
    RFC 5050 - Bundle Protocol Specification - IETF Datatracker
    This document describes the end-to-end protocol, block formats, and abstract service description for the exchange of messages (bundles) in Delay Tolerant ...
  55. [55]
    [PDF] Offloading Infrastructure using Delay Tolerant Networks and ...
    This can be exploited to deploy infrastructure-less networks that provide end-to-end routing through opportunistic ad-hoc communication. Such Delay Tolerant ...<|control11|><|separator|>
  56. [56]
    Distance-Based Opportunistic Mobile Data Offloading - PMC
    Jun 15, 2016 · With tens of minutes delay, 70%–90% of cellular network traffic can be offloaded. Car-Fi offloads data traffic from cellular networks to ...Missing: core | Show results with:core
  57. [57]
    Deutsche Telekom partners with Fon for crowdsourced Wi-Fi, plans ...
    Mar 4, 2013 · The carrier has announced a new partnership with Fon, a crowdsourced Wi-Fi hotspot provider, that will add more than 12,000 of Fon's hotspots ...
  58. [58]
    Deutsche Telekom and FON deal points firmly in direction of Wi-Fi ...
    May 3, 2013 · Wi-Fi and hotspots can be used to divert heavy data traffic to fixed-line networks and thus reduce the load on mobile networks.” Deutsche ...
  59. [59]
    [PDF] Vehicular WiFi offloading
    Dec 24, 2013 · The built-in WiFi radio or WiFi-enabled mobile devices on board can access the Internet when vehicles are moving in the coverage of WiFi ...
  60. [60]
    [PDF] Opportunistic WiFi Offloading in a Vehicular Environment: Waiting or ...
    This paper considers a vehicular network with multiple Roadside Units (RSUs), which are connected with the Internet to offer the Internet access for the drive- ...
  61. [61]
    [PDF] Mobile Data Offloading through Opportunistic Communications and ...
    Apr 24, 2011 · For example, the Heuristic algorithm can offload mobile data traffic by up to 73.66% for a real-world mobility trace. Moreover, to investigate ...
  62. [62]
    [PDF] MOBILE DATA OFFLOADING USING WIFI NETWORKS IN URBAN ...
    Jul 12, 2024 · This thesis aims to improve mobile data offloading systems using urban WiFi to offload data while users are in transit, leveraging WiFi ...
  63. [63]
    Opportunistic Mobile Data Offloading with Deadline Constraints
    Jun 28, 2017 · In this paper, we focus on the problem of offloading many deadline-sensitive data items to some WiFi networks with capacity constraints; that is ...
  64. [64]
    [PDF] Deadline-Sensitive Mobile Data Offloading via Opportunistic ...
    To solve this problem, we propose a greedy oFfline Data Offloading (FDO) algorithm, and prove that this algorithm can achieve an approximation ratio of 2.
  65. [65]
    [PDF] Opportunistic Mobile Data Offloading with Deadline Constraints
    Abstract—Due to the explosive proliferation of mobile cloud computing applications, much data needs to be transmitted between mobile users and clouds, ...
  66. [66]
    [PDF] Deadline-Sensitive Mobile Data Offloading via Opportunistic ...
    This problem involves a probabilistic combination of multiple 0-1 knapsack constraints, which differs from existing problems. To solve this problem, we propose ...
  67. [67]
    A Design and Simulation of the Opportunistic Computation ... - MDPI
    Nov 2, 2018 · The NS-3 simulator was chosen as the main tool for simulating our proposed scheme because its implementation stack is very similar to the real- ...
  68. [68]
    [PDF] Network-Assisted Offloading for Mobile Cloud Applications - ORBilu
    The validation results, obtained from NS-3 simulations, confirm effectiveness of the proposed solution in balancing cellular traffic load while ensuring QoS.
  69. [69]
    Loon - A Google X Moonshot
    Loon was Google X's moonshot to deliver internet connectivity to billions using stratospheric balloons.Missing: aerial | Show results with:aerial
  70. [70]
    Lessons From the Commercial Failure of Project Loon for 6G ...
    However, the sudden news released in January 2021 that Alphabet is shutting down Project Loon, one of the most important projects enabling communications over ...
  71. [71]
    Cellular Traffic Offloading through WiFi Networks - Semantic Scholar
    This paper is the first to quantitatively evaluate the gains of citywide WiFi offloading using large scale real traces and shows that even with a sparse ...Missing: Beijing transit
  72. [72]
    Mobile Data Traffic Offloading through Opportunistic Vehicular ...
    Dec 23, 2020 · As seen, the efficiency of such opportunistic traffic offloading is highly determined by two key factors: (1) initial source selection and (2) ...Missing: core | Show results with:core
  73. [73]
    [PDF] Exploiting Content Caching and Delivery Techniques for 5G Systems
    Content caching in 5G involves caching popular content in intermediate servers to reduce traffic, with potential in the evolved packet core and radio access ...
  74. [74]
    5G Evolution for Multicast and Broadcast Services in 3GPP Release ...
    Aug 8, 2025 · Integrated Terrestrial and Non-Terrestrial-Network Architecture for Edge Caching and Coded Delivery in 3GPP System. Conference Paper. Jan 2025.
  75. [75]
    Efficient Edge Cache Collaboration Transmission Strategy of ...
    Apr 9, 2021 · Through edge nodes in trust community cooperation and communication, efficient data packet delivery is realized, thereby improving the community.
  76. [76]
    Report Finds Public Access Small Cells Could Quickly Carry More ...
    May 8, 2012 · It found that with a ratio of one public access small cell per macrocell, 21% of users would be offloaded; this rises to 56% with four small ...Missing: percentage | Show results with:percentage
  77. [77]
    Data Offloading Techniques in 3GPP Rel-10 Networks: A Tutorial
    Aug 9, 2025 · Traffic Offloading: 3GPP, through Release-10, introduced Local IP Access (LIPA) and Selected IP Traffic Offloading (SIPTO) [62] protocols.
  78. [78]
    Small Cell Technology: The 5G Network Backbone - Telit Cinterion
    Oct 24, 2022 · These are mainly used to offload networks when they become congested. Femtocells can extend coverage and enhance building penetration for indoor ...
  79. [79]
    16 - Self-organization and interference avoidance for LTE femtocells
    By using SON capabilities, operator intervention for network operation and maintenance can be reduced, thus minimizing deployment and operational costs of ...
  80. [80]
    A survey on interference management techniques in femtocell self ...
    Therefore, we provide a survey on the different interference and resource management techniques in Self-Organizing Network according to specifics classification ...
  81. [81]
    [PDF] Femto Cells- A New Generation Cellular Stations
    deliver over 100 Mbps to the end user in a spectrum bandwidth up to 20 MHz, an LTE Femto cell can address the bandwidth scarcity problem. Such high speeds in ...
  82. [82]
    Small Cell Equipment Market Tracker - H1 2020 Omdia - Informa
    We expect the total small cell market to hit $2.6B in 2020, up 9% over 2019; total units will grow 22% to 5.1M with both indoor service provider small cells ...Missing: statistics | Show results with:statistics
  83. [83]
    [PDF] Small Cell Backhaul Requirements - NGMN Alliance
    Jun 4, 2012 · An optional intermediate aggregation gateway like the HeNB or HNB Gateway may also be used, which offers connectivity to the backhaul network ...
  84. [84]
    [PDF] Matching Theory for Backhaul Management in Small Cell Networks ...
    Jan 11, 2015 · The concurrent transmissions at different frequency bands is achievable by using carrier aggregation (CA) technique, introduced in LTE-Advanced ...
  85. [85]
    Device-To-Device Communication - an overview - ScienceDirect.com
    Device-to-device communication (D2D) is defined as direct connectivity between devices, allowing them to exchange data without the involvement of centralized ...
  86. [86]
    Wi-Fi Direct (peer-to-peer or P2P) overview - Android Developers
    Wi-Fi Direct (P2P) allows devices with the appropriate hardware to connect directly to each other via Wi-Fi without an intermediate access point.
  87. [87]
    Release 12 - 3GPP
    Other important features completed in Release 12 include: Small cells and Network densification, D2D, LTE TDD-FDD joint operation including Carrier Aggregation, ...Missing: ANDSF enhancements
  88. [88]
    Mesh networks and Firechat make 'switching off the internet' that ...
    Oct 7, 2014 · The technology now wielded by the students and protesters in Hong Kong has evolved. The Firechat app isn't connected to a centralised service or ...Missing: D2D | Show results with:D2D
  89. [89]
    [PDF] A Tutorial on 5G NR V2X Communications - arXiv
    This paper presents an in-depth tutorial of the 3GPP Release 16 5G NR V2X standard for V2X communications, with a particular focus on the sidelink, since it ...
  90. [90]
    Optimizing the Bluetooth Low Energy Service Discovery Process
    May 31, 2021 · This paper proposes a new Rapid Service Discovery Protocol, which enables a fast and efficient service discovery.Missing: D2D scanning TTL offloading
  91. [91]
    [PDF] A Survey of Opportunistic Offloading - University of Southampton
    Abstract—This paper surveys the literature of opportunistic offloading. Opportunistic offloading refers to offloading traffic.
  92. [92]
    [PDF] Energy Efficiency in Multicast Multihop D2D Networks - arXiv
    Jun 8, 2016 · This work addressed the energy efficiency of grouping solution in multicast multihop D2D cooperative network in a content distribution scenario.<|separator|>
  93. [93]
    DARPA wants huge Holy Grail of mobile ad hoc networks
    Apr 30, 2013 · Develop what's known as mobile ad-hoc wireless technology that lets 1000- 5000 nodes connect simultaneously and securely connect in the field.
  94. [94]
  95. [95]
    10th Annual Cisco Visual Networking Index (VNI) Mobile Forecast ...
    In 2015, 51 percent of total mobile data traffic was offloaded; by 2020, 55 percent of total mobile data traffic will be offloaded. · By 2020, over 75 ...
  96. [96]
  97. [97]
    (PDF) Bargaining-Based Mobile Data Offloading - ResearchGate
    Aug 10, 2025 · Data offloading through third-party WiFi or femtocell access points (APs) can effectively alleviate the cellular network congestion in a low ...
  98. [98]
    [PDF] A Green Perspective on Wi-Fi Offloading - arXiv
    Jul 27, 2015 · Re- cently, a number of studies have investigated energy efficient cellular network operation through various base station switch- off ...
  99. [99]
    5G Versus Wi-Fi: Challenges for Economic, Spectrum, and Security ...
    Dec 1, 2021 · The technical elements of 5G and Wi-Fi have different security vulnerabilities in protocols, infrastructure, encryption, authentication, and ...Missing: hurdles | Show results with:hurdles
  100. [100]
  101. [101]
    On Practical Aspects of Mobile Data Offloading to Wi-Fi Networks
    WAG acts as a dynamically configured firewall, while the ePDG as a tunnelling end point. Fig 3: 3GPP I-WLAN specified tightly coupled cellular (LTE) ...
  102. [102]
    Spectrum Sharing: Navigating the Challenges and Opportunities
    Jul 15, 2024 · We explore the intricacies of spectrum sharing, highlighting both the opportunities and the hurdles it presents.
  103. [103]
    Security, trust and privacy risks, responses, and solutions for high ...
    (SLAs) Consumers may face issues as a result of vendor lock-in, lax security measures, data unavailability, hidden costs, and opaque infrastructure ...
  104. [104]
    Towards effective offloading mechanisms in fog computing - PMC
    Oct 19, 2021 · This paper provides a systematic and comprehensive study to evaluate fog offloading mechanisms' current and recent works.
  105. [105]
    Redefining 6G Network Slicing: AI-Driven Solutions for Future Use ...
    Unlike 5G, which primarily extends LTE technologies, 6G networks envision a data-driven, AI-native framework that integrates communication, computing, and ...Missing: satellite D2D
  106. [106]
    Satellite-Based ITS Data Offloading & Computation in 6G Networks
    In this study, we propose a novel approach to ITS data offloading and computation services based on SANs. We use low-Earth orbit (LEO) and cube satellites ( ...
  107. [107]
    Blockchain technology meets 6 G wireless networks: A systematic ...
    This paper paints a holistic picture of 6 G wireless networks and Blockchain, including architecture, Blockchain-assisted 6 G services, deployment.
  108. [108]
    Integration of Network Slicing and Machine Learning into Edge ...
    Although there are previous works reviewing network slicing and edge computing mechanisms in 5G and beyond networks, our paper focuses on their combination ...Missing: post- | Show results with:post-
  109. [109]
    [PDF] Commercializing 5G Network Slicing 1
    Horizontal slicing is designed to accommodate capacity scaling and enable Edge computing and offloading. MEC can be an enabler of horizontal slicing, as it ...Missing: post- | Show results with:post-