User-Oriented Redundancy Elimination Mechanism in Enterprise WLANs
Author:
Affiliation:

  • Article
  • | |
  • Metrics
  • |
  • Reference [20]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    The rapid spreading of mobile devices and smartphones has promoted the deployment of enterprise WLANs. This research collects read traces from over 10000 WiFi users in one university in Shanghai. Through intensive data analysis, it finds that there exists more than 24% redundancy traffic in WLANs. By mining the patterns of data set, a user-oriented redundancy elimination strategy is proposed to allocate different cache sizes to different users adaptively. Simulation results show that user-oriented redundancy elimination strategy can detect and eliminate redundant traffic effectively.

    Reference
    [1] Spring N, Wetherall D. A protocal-independent technique for eliminating redundant network traffic. ACM SIGCOMM Computer Communication Review, 2000.
    [2] Anand A, Gupta A, et al. Packet caches on routers:The implications of universal redundant traffic elimination. ACM SIGCOMM Computer Communication Review, 2008,38(4):219-230.
    [3] Anand A, Sekar V, Akella A. SmartRE:An architecture for coordinated network-wide redundancy elimination. In:Proc. of the SIGCOMM. ACM, 2009. 87-98.
    [4] Anand A, Muthukrishhan C, Akella A, et al. Redundancy in network traffic:Findings and implications. In:Proc. of the 11th Int'l Joint Conf. on Measurement and Modeling of Computer Systems. 2009.
    [5] Squid Web proxy cache. http://www.squid-cache.org/
    [6] PeerApp:P2P and media caching. http://www.peerapp.com
    [7] Agarwal B, Akella A, Anand A, et al. EndRE:An end-system redundancy elimination service for enterprises. In:Proc. of the NSDI. 2010.
    [8] Li X, Salyers D, et al. Improving packet caching scalability through the concept of an explicit end of data marker. In:Proc. of the HotWeb. 2006.
    [9] Dogar F, Pucha H, et al. A system for opportunistic caching in multi-hop wireless mesh network. In:Proc. of the ACM MobiCom. 2008.
    [10] Breslau L, Cao P, et al. Web caching and Zipf-like distributions:Evidence and implications. In:Proc. of the IEEE INFOCOM. 1999.
    [11] Wolman A, et al. On the scale and performance of cooperative Web proxy caching. In:Proc. of the ACM Symp. on Operating Systems Principles. 1999.
    [12] Qian F, Quah KS, Huang J, et al. Web caching on smartphones:Ideal vs. reality. In:Proc. of the 10th Int'l Conf. on Mobile Systems, Applications, and Services. 2012.
    [13] Rabin MO. Fingerprinting by random polynomials. Technical Report, TR-15-81, Center for Research in Computing Technology, Harvard University, 1981.
    [14] Ziv J, Lempel A. A university algorithm for sequential data compression information theory. IEEE Trans. on Information Theory, 1997,23(3):337-343.
    [15] Rivest R. The MD5 Message-Digest Algorithm. RFC 1321, Networking Working Group, Requests for Comment, 1992.
    [16] Specifications for Secure Hash Standard. National Institute of Standards and Technology, 1995.
    [17] SAHA S. On reducing the processing load of redundancy elimination algorithms. In:Proc. of the GLOBECOM Workshops (GC Wksps). 2011.
    [18] Manber U. Finding similar files in a large file system. In:Proc. of the USENIX Winter Technical Conf. 1994.
    [19] Schleimer S, Wilkerson D, Aiken A. Winnowing:Local algorithm for document fingerprinting. In:Proc. of the 2003 ACM SIGMOD Int'l Conf. on Management of Data. 2003.
    [20] Fan L, Cao P, Almeida J, Broder AZ. Summary cache:A scalable wide-area Web cache sharing protocol. IEEE/ACM Trans. on Networking, 1998. 254-265.
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

周新生,薛广涛.一种面向用户的企业级无线局域网冗余消除机制.软件学报,2015,26(S2):119-127

Copy
Share
Article Metrics
  • Abstract:2029
  • PDF: 3519
  • HTML: 0
  • Cited by: 0
History
  • Received:May 02,2014
  • Revised:August 22,2014
  • Online: January 11,2016
You are the first2032512Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063