Proxy-based wireless data access algorithms in mobile hotspots

Sangheon Pack, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Kunwoo Park

Research output: Contribution to journalArticlepeer-review

20 Citations (Scopus)

Abstract

In this paper, we investigate efficient wireless data access algorithms in mobile hotspots. We introduce a proxy cache (PC) and propose PC-based poll-each-read (P-PER) and PC-based callback (P-CB) data access algorithms to reduce the transmission cost over wireless links in mobile hotspots. An analytical model is developed, and extensive simulations are conducted to demonstrate the performance of P-PER and P-CB. It is shown that P-PER and P-CB can improve cache hit performance and significantly reduce transmission cost. A tradeoff between P-PER and P-CB suggests the need to use a hybrid proxy-based approach to attain optimal performance of wireless data access in mobile hotspots.

Original languageEnglish
Pages (from-to)3165-3177
Number of pages13
JournalIEEE Transactions on Vehicular Technology
Volume57
Issue number5
DOIs
Publication statusPublished - 2008

Bibliographical note

Funding Information:
Manuscript received September 2, 2007; revised December 15, 2007 and January 2, 2008. This work was supported in part by the Natural Sciences and Engineering Research Council (NSERC) of Canada under Strategic Grant STPGP 257682 and in part by the IT R&D Program of the Ministry of Information and Communication/Institute of Information Technology Assessment under Project 2007-F-038-01 (Fundamental Technologies for the Future Internet). The review of this paper was coordinated by Dr. J. Misic.

Keywords

  • Callback (CB)
  • Mobile hotspots
  • Poll-each-read (PER)
  • Proxy cache (PC)-based CB (P-CB)
  • Proxy cache (PC)-based PER (P-PER)
  • Wireless data access

ASJC Scopus subject areas

  • Automotive Engineering
  • Aerospace Engineering
  • Electrical and Electronic Engineering
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Proxy-based wireless data access algorithms in mobile hotspots'. Together they form a unique fingerprint.

Cite this