Skip to main content

Repairable Fountain Codes with Unequal Locality for Heterogeneous D2D Data Storage Networks

  • Conference paper
  • First Online:
  • 1509 Accesses

Abstract

In this paper, we consider a problem about a novel distributed erasure code, named repairable fountain code (RFC), used in heterogeneous networks (HetNets) including different micro base station (MBS) coverage areas, for data storage and delivery among the devices connected by D2D links. The system model of three-tier MBS distributed data storage network is presented and the basic principle is also detailed illustrated. Then, the downloading and repairing communication costs of RFC are analyzed based on its rateless, systematic and lower locality properties. Particularly, the unequal repair locality of RFC (URL-RFC) is designed and discussed for the adaption to the different mobilities with the Poisson process of the nodes in three MBS coverages, and to further reduce the energy cost. The simulation results show that, the URL-RFC scheme we proposed can obtain the lowest cost performance in the case of instantaneous repair, and the cost of URL-RFC is larger than that of RFC when the repair interval is also larger, but it will finally approach to the RFC communication cost curve.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Zhao, X., Yuan, P., Chen, Y., Chen, P.: Cooperative D2D for content delivery in heterogeneous networks. In: International Conference on Big Data Computing and Communications, pp. 265–271 (2017)

    Google Scholar 

  2. Wang, L., Wu, H., Han, Z.: Wireless distributed storage in socially enabled D2D communications. IEEE Access 4, 1971–1984 (2017)

    Article  Google Scholar 

  3. Paakkonen, J., Hollanti, C., Tirkkonen, O.: Device-to-device data storage for mobile cellular systems. In: GLOBECOM Workshops, pp. 671–676 (2013)

    Google Scholar 

  4. Golrezaei, N., Dimakis, A.G., Molisch, A.F.: Wireless device-to-device communications with distributed caching. In: IEEE International Symposium on Information Theory Proceedings, pp. 2781–2785 (2012)

    Google Scholar 

  5. Golrezaei, N., Molisch, A.F., Dimakis, A.G., Caire, G.: Femtocaching and device-to-device collaboration: a new architecture for wireless video distribution. IEEE Commun. Mag. 51(4), 142–149 (2013)

    Article  Google Scholar 

  6. Pääkkönen, J., Hollanti, C., Tirkkonen, O.: Device-to-device data storage with regenerating codes. In: International Workshop on Multiple Access Communications, pp. 57–69 (2015)

    Chapter  Google Scholar 

  7. Silberstein, M., Ganesh, L., Wang, Y., Alvisi, L., Dahlin, M.: Lazy means smart: reducing repair bandwidth costs in erasure-coded distributed storage. In: Proceedings of International Conference on Systems and Storage (SYSTOR), Haifa, Israel, pp. 1–7 (2014)

    Google Scholar 

  8. Pedersen, J., i Amat, A.G., Andriyanova, I., Brannstrom, F.: Repair scheduling in wireless distributed storage with D2D communication. In: Information Theory Workshop - Fall, pp. 69–73 (2015)

    Google Scholar 

  9. Asteris, M., Dimakis, A.G.: Repairable fountain codes. IEEE J. Sel. Areas Commun. 32(5), 1037–1047 (2014)

    Article  Google Scholar 

  10. Luo, Z., Song, L., Zheng, S., Ling, N.: Raptor codes based unequal protection for compressed video according to packet priority. IEEE Trans. Multimedia 15(8), 2208–2213 (2013)

    Article  Google Scholar 

  11. Sejdinovic, D., Vukobratovic, D., Doufexi, A., Åăenk, V., Piechocki, R.J.: Expanding window fountain codes for unequal error protection. IEEE Trans. Commun. 57(9), 2510–2516 (2009)

    Article  Google Scholar 

  12. Hu, Y., et al.: Unequal failure protection coding technique for distributed cloud storage systems. IEEE Trans. Cloud Comput. (2017), Early access. https://doi.org/10.1109/TCC.2017.2785396

  13. Miller, S., Childers, D.: Probability and Random Processes, 2nd edn (2012)

    Chapter  Google Scholar 

  14. Pedersen, J., Amat, A.G.I., Andriyanova, I., Brännström, F.: Distributed storage in mobile wireless networks with device-to-device communication. IEEE Trans. Commun. 64(11), 4862–4878 (2016)

    Article  Google Scholar 

  15. Shokrollahi, A.: Raptor codes. IEEE Trans. Inf. Theory 52(6), 2551–2567 (2006)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Sciences Foundation of China under Grant 61701136, Grant 61831008, and Grant 61525103, China Postdoctoral Science Foundation Grant 2018M630357, Guangdong Science and Technology Planning Project 2018B030322004 and Shenzhen Basic Research Program under Grant JCYJ20170811154233370 and Grant ZDSYS201707280903305.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shushi Gu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Gu, S., Wang, Y., Xiang, W., Zhang, Q. (2019). Repairable Fountain Codes with Unequal Locality for Heterogeneous D2D Data Storage Networks. In: Jia, M., Guo, Q., Meng, W. (eds) Wireless and Satellite Systems. WiSATS 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 280. Springer, Cham. https://doi.org/10.1007/978-3-030-19153-5_53

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-19153-5_53

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-19152-8

  • Online ISBN: 978-3-030-19153-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics