17
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Redundancy Elimination Might Be Overrated: A Quantitative Study on Real-World Wireless Traffic

      Preprint
      ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          With significant increases in mobile device traffic slated for the foreseeable future, numerous technologies must be embraced to satisfy such demand. Notably, one of the more intriguing approaches has been blending on-device caching and device-to-device (D2D) communications. While various past research has pointed to potentially significant gains (30%+) via redundancy elimination (RE), some skepticism has emerged to whether or not such gains are truly harnessable in practice. The premise of this paper is to explore whether or not significant potential for redundancy elimination exists and whether the rise of video and encryption might blunt said efforts. Critically, we find that absent significant synchronized interests of mobile users, the actual redundancy falls well short of the promising values from the literature. In our paper, we investigate the roots for said shortcomings by exploring RE savings with regards to cache hit characteristics and to what extent client and domain diversity contribute to the realized redundancy savings.

          Related collections

          Author and article information

          Journal
          2016-05-12
          Article
          1605.04021
          21a1f8ef-2c34-459a-bfaa-1b739c7a9168

          http://arxiv.org/licenses/nonexclusive-distrib/1.0/

          History
          Custom metadata
          Submitted to ACM IMC (Internet Measurement Conference) 2016
          cs.NI

          Networking & Internet architecture
          Networking & Internet architecture

          Comments

          Comment on this article