Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2507924.2507928acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Exploiting graph partitioning for hierarchical replica placement in WMNs

Published: 03 November 2013 Publication History

Abstract

Content replication has gained much popularity in recent years both in the wired and wireless infrastructures. A key challenge faced by Wireless Mesh Networks (WMNs) is to determine the number and locations of content replicas (e.g. video clip) such that the mesh clients access cost is minimized. Furthermore, the dynamic nature of the wireless environment favors a distributed and adaptive solution to this problem. In this paper, we present an efficient, lightweight and scalable object replication and placement scheme for WMNs. Since the placement problem is NP-Complete, the scheme decomposes the problem into smaller sub-problems to facilitate the distributed approach in a P2P fashion. Moreover, it exploits the long-term link-quality routing metrics to augment the replica placement decision and the instantaneous link-quality metrics for replica server selection. The effectiveness of our scheme is evaluated through extensive simulation studies.

References

[1]
I. F. Akyildiz, X. Wang, and W. Wang, "Wireless mesh networks: a survey," Comput. Netw., vol. 47, pp. 445--487, March 2005.
[2]
H. Chen and Y. Xiao, "Cache access and replacement for future wireless internet," Comm. Mag., vol. 44, pp. 113--123, May 2006.
[3]
S. M. Das, H. Pucha, and Y. C. Hu, "Mitigating the gateway bottleneck via transparent cooperative caching in wireless mesh networks," Ad Hoc Netw., vol. 5, pp. 680--703, August 2007.
[4]
D. S. J. De Couto, D. Aguayo, J. Bicket, and R. Morris, "A high-throughput path metric for multi-hop wireless routing," Wirel. Netw., vol. 11, pp. 419--434, July 2005.
[5]
R. Draves, J. Padhye, and B. Zill, "Routing in multi-radio, multi-hop wireless mesh networks," in Proceedings of the 10th annual international conference on Mobile computing and networking, MobiCom '04, (New York, NY, USA), pp. 114--128, ACM, 2004.
[6]
D. Passos, C. de Albuquerque, M. Campista, L. Costa, and O. Duarte, "Minimum loss multiplicative routing metrics for wireless mesh networks," Journal of Internet Services and Applications, vol. 1, pp. 201--214, 2011. 10.1007/s13174-010-0015-6.
[7]
Z. Al-Arnaout, Q. Fu, and M. Frean, "A content replication scheme for wireless mesh networks," in Proceedings of the 22nd international workshop on Network and operating systems support for digital audio and video, NOSSDAV '12, 2012.
[8]
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: a scalable peer-to-peer lookup protocol for internet applications," IEEE/ACM Trans. Netw., vol. 11, pp. 17--32, Feb. 2003.
[9]
T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, and L. Viennot, "Optimized Link State Routing Protocol (OLSR)," 2003. Network Working Group Network Working Group.
[10]
M. Campista, P. Esposito, I. Moraes, L. Costa, O. Duarte, D. Passos, C. de Albuquerque, D. Saade, and M. Rubinstein, "Routing metrics and protocols for wireless mesh networks," Network, IEEE, vol. 22, pp. 6 --12, jan.-feb. 2008.
[11]
J. Current, M. Daskin, and D. Schilling, "Discrete network location models," Industrial Engineering, pp. 81--118, 2002.
[12]
B. W. Kernighan and S. Lin, "An efficient heuristic procedure for partitioning graphs," Bell System Technical Journal, vol. 49, no. 2, pp. 291--307, 1970.
[13]
A. Welsh, "The trimmed mean in the linear model," The Annals of Statistics, vol. 15, no. 1, pp. 20--36, 1987.
[14]
B. Yang and H. Garcia-Molina, "Designing a super-peer network," Data Engineering, International Conference on, vol. 0, p. 49, 2003.
[15]
A. Varga and R. Hornig, "An overview of the omnet++ simulation environment," in Simutools '08: Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops, (ICST, Brussels, Belgium, Belgium), pp. 1--10, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2008.
[16]
A. A. Quintana, E. Casilari, and A. Trivi\ no, "Implementation of manet routing protocols on omnet++," 2008.
[17]
I. Baumgart, B. Heep, and S. Krause, "Oversim: A flexible overlay network simulation framework," in IEEE Global Internet Symposium, 2007, pp. 79--84, 2007.
[18]
J. Kangasharju, J. Roberts, and K. W. Ross, "Object replication strategies in content distribution networks," Computer Communications, vol. 25, no. 4, pp. 376--383, 2002.
[19]
G. Pallis, A. Vakali, K. Stamos, A. Sidiropoulos, D. Katsaros, and Y. Manolopoulos, "A latency-based object placement approach in content distribution networks," in Proceedings of the Third Latin American Web Congress, (Washington, DC, USA), pp. 140--, IEEE Computer Society, 2005.
[20]
C. Cunha, A. Bestavros, and M. Crovella, "Characteristics of www client-based traces," tech. rep., Boston, MA, USA, 1995.
[21]
B.-J. Ko and D. Rubenstein, "Distributed self-stabilizing placement of replicated resources in emerging networks," IEEE/ACM Trans. Netw., vol. 13, pp. 476--487, June 2005.
[22]
S. Jin and L. Wang, "Content and service replication strategies in multi-hop wireless mesh networks," in Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, MSWiM '05, (New York, NY, USA), pp. 79--86, ACM, 2005.
[23]
A. Al Asaad, S. Gopalakrishnan, and V. Leung, "Peer-to-peer file sharing over wireless mesh networks," in Communications, Computers and Signal Processing, 2009. PacRim 2009. IEEE Pacific Rim Conference on, pp. 697--702, aug. 2009.
[24]
J.-W. Ding, W.-T. Wang, and C.-F. Wang, "An efficient data replication scheme for peer-to-peer video streaming over wireless-mesh community networks," in Intelligent Information Hiding and Multimedia Signal Processing, 2008. IIHMSP '08 International Conference on, pp. 767--770, aug. 2008.

Cited By

View all
  • (2019)A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest PerspectiveSymmetry10.3390/sym1106077411:6(774)Online publication date: 10-Jun-2019

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWiM '13: Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
November 2013
468 pages
ISBN:9781450323536
DOI:10.1145/2507924
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. distributed algorithm
  2. peer-to-peer networking
  3. replica placement
  4. wireless mesh network

Qualifiers

  • Research-article

Conference

MSWiM '13
Sponsor:

Acceptance Rates

MSWiM '13 Paper Acceptance Rate 42 of 184 submissions, 23%;
Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)A Study on Security and Privacy Guidelines, Countermeasures, Threats: IoT Data at Rest PerspectiveSymmetry10.3390/sym1106077411:6(774)Online publication date: 10-Jun-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media