Proxy-based wireless data access algorithms in mobile hotspots

Sangheon Pack, Humphrey Rutagemwa, Xuemin Shen, Jon W. Mark, Kunwoo Park

    Research output: Contribution to journalArticlepeer-review

    20 Citations (Scopus)

    Abstract

    In this paper, we investigate efficient wireless data access algorithms in mobile hotspots. We introduce a proxy cache (PC) and propose PC-based poll-each-read (P-PER) and PC-based callback (P-CB) data access algorithms to reduce the transmission cost over wireless links in mobile hotspots. An analytical model is developed, and extensive simulations are conducted to demonstrate the performance of P-PER and P-CB. It is shown that P-PER and P-CB can improve cache hit performance and significantly reduce transmission cost. A tradeoff between P-PER and P-CB suggests the need to use a hybrid proxy-based approach to attain optimal performance of wireless data access in mobile hotspots.

    Original languageEnglish
    Pages (from-to)3165-3177
    Number of pages13
    JournalIEEE Transactions on Vehicular Technology
    Volume57
    Issue number5
    DOIs
    Publication statusPublished - 2008

    Bibliographical note

    Funding Information:
    Manuscript received September 2, 2007; revised December 15, 2007 and January 2, 2008. This work was supported in part by the Natural Sciences and Engineering Research Council (NSERC) of Canada under Strategic Grant STPGP 257682 and in part by the IT R&D Program of the Ministry of Information and Communication/Institute of Information Technology Assessment under Project 2007-F-038-01 (Fundamental Technologies for the Future Internet). The review of this paper was coordinated by Dr. J. Misic.

    Keywords

    • Callback (CB)
    • Mobile hotspots
    • Poll-each-read (PER)
    • Proxy cache (PC)-based CB (P-CB)
    • Proxy cache (PC)-based PER (P-PER)
    • Wireless data access

    ASJC Scopus subject areas

    • Automotive Engineering
    • Aerospace Engineering
    • Electrical and Electronic Engineering
    • Applied Mathematics

    Fingerprint

    Dive into the research topics of 'Proxy-based wireless data access algorithms in mobile hotspots'. Together they form a unique fingerprint.

    Cite this