Analyzing Opportunistic Request Routing in Wireless Cache Networks

نویسندگان

  • J. Dinal Herath
  • Anand Seetharam
چکیده

To address the explosive increase in mobile data traffic in recent years, content caching at storage-enabled network nodes has been proposed. Alongside, a variety of forwarding strategies have been developed for wireless networks that exploit the broadcast nature of the wireless medium and the presence of time-varying fading channels to improve user performance. A widely popular forwarding strategy is opportunistic routing that opportunistically selects nodes that overhear packet transmissions to serve as ad hoc relays to forward the packet. In this paper, we investigate the request routing delay of a greedy opportunistic routing strategy for cache-enabled wireless networks considering uncorrelated and temporally correlated Rayleigh fading wireless channels. To this end, we develop Markovian models, leverage the wireless channel characteristics to determine the transition probabilities and then utilize them to obtain the request routing delay. Via numerical evaluation and simulation, we demonstrate the validity and effectiveness of our model in determining the request routing delay. We also investigate the impact of network parameters on performance through our experiments. Our work takes a step forward in providing network operators a tool for analyzing network performance before deploying their networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A fault tolerance routing protocol considering defined reliability and energy consumption in wireless sensor networks

In wireless sensor networks, optimal consumptionof energy and having maximum life time are important factors. In this article attempt has been made to send the data packets with particular reliability from the beginning based on AODV protocol. In this way two new fields add to the routing packets and during routing and discovering of new routes, the lowest remained energy of nodes and route tra...

متن کامل

The Feedback Based Mechanism for Video Streaming Over Multipath Ad Hoc Networks

Ad hoc networks are multi-hop wireless networks without a pre-installed infrastructure. Such networks are widely used in military applications and in emergency situations as they permit the establishment of a communication network at very short notice with a very low cost. Video is very sensitive for packet loss and wireless ad-hoc networks are error prone due to node mobility and weak links. H...

متن کامل

A Unified Metric for Opportunistic Routing in Wireless Mesh Networks

In wireless mesh networks, the routing of packets from source to destination is crucial and challenging task. The wireless mesh networks find applications in disaster management, video on demand, intelligent, health care systems, etc. Various routing protocols exist in literature to improve the efficiency of the wireless mesh networks calculated in terms of reliability, cost, throughput, error ...

متن کامل

Crowd cloud routing protocol based on opportunistic computing for wireless sensor networks

We proposed a crowd cloud routing protocol based on opportunistic computing to improve the data transmission efficiency, reliability, and reduce routing overhead in wireless sensor networks. Based on the analysis of the demand of big data processing in wireless sensor network, the data analysis and processing platform for wireless sensor network are designed based on the combination with the cl...

متن کامل

Improving Energy Consumption by Using Cluster Based Routing Algorithm in Wireless Sensor Networks

Multi-path is favorite alternative for sensor networks, as it provides an easy mechanism to distributetraffic, as well as considerate fault tolerance. In this paper, a new clustering based multi path routingprotocol namely ECRR (Energy efficient Cluster based Routing algorithm for improving Reliability) isproposed, which is a new routing algorithm and guarantees the achievement to required QoS ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017