Cooperative Internet Access Using Helper Nodes and Opportunistic Scheduling

Pouya Ostovari, Jie Wu, Abdallah Khreishah

Research output: Contribution to journalArticlepeer-review

9 Scopus citations


Having ubiquitous access to the Internet is becoming a necessity of life. Furthermore, we are witnessing a rapid increase in the amount of data requested by mobile users. Cooperative Internet access is a promising approach for addressing these demands, which gives the mobile devices the opportunity to receive help from other mobile devices in order to access the Internet. The helpers can download the data requested by the other users, called clients, through their cellular connections. Then, they transmit the downloaded data to the clients using Wi-Fi or Bluetooth connections. In this paper, we consider the problem of how to share the resources of helpers among a set of clients that request their assistance. Opportunistic scheduling is an effective method that uses the dynamic channel conditions to elevate the systems' overall utilities. We propose an opportunistic scheduling algorithm in order to efficiently use the helper nodes and share them among the clients fairly. We propose a rate control and scheduling method in the case of using only Wi-Fi connections. We also propose a solution for the case of using Wi-Fi and Bluetooth at the same time. Through simulation results, we show the effectiveness of our cooperative downloading methods.

Original languageEnglish (US)
Pages (from-to)6439-6448
Number of pages10
JournalIEEE Transactions on Vehicular Technology
Issue number7
StatePublished - Jul 2017

All Science Journal Classification (ASJC) codes

  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Computer Networks and Communications
  • Automotive Engineering


  • Cooperative download
  • cellular network
  • device-to-device communication
  • opportunistic scheduling


Dive into the research topics of 'Cooperative Internet Access Using Helper Nodes and Opportunistic Scheduling'. Together they form a unique fingerprint.

Cite this