skip to main content
10.1145/1853079.1853086acmotherconferencesArticle/Chapter ViewAbstractPublication PagescfiConference Proceedingsconference-collections
research-article

Decentralized and autonomous content overlay networking (DACON) with WiFi access points

Published: 16 June 2010 Publication History

Abstract

Accessing contents from mobile devices becomes more and more proliferated and hence the need for the content distribution in the pervasive environment is growing. However, distributing contents in such environments taxes wireless network operators substantially. To provide the content distribution service in a reasonable cost, we pay attention to user-deployable WiFi access points (APs). In this paper, we propose a decentralized and autonomous content overlay networking (DACON) architecture for the pervasive content distribution services, which is the overlay network architecture comprised of public WiFi APs. We identify and answer major challenges in realizing the content distribution service in the pervasive environment by exploiting the overlay network of public WiFi APs.

References

[1]
K. Aberer, P. CudrÃl'-Mauroux, M. Hauswirth, and T. V. Pelt. Gridvine: Building internet-scale semantic overlay networks. Lecture Notes in Computer Science, 3298:107--121, 2004.
[2]
M. Afanasyev, T. Chen, G. M. Voelker, and A. C. Snoeren. Analysis of a mixed-use urban wifi network: when metropolitan becomes neapolitan. In IMC '08: Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, pages 85--98, New York, NY, USA, 2008. ACM.
[3]
M. Bender, S. Michel, P. Triantafillou, G. Weikum, and C. Zimmer. Minerva: collaborative p2p search. In VLDB '05: Proceedings of the 31st international conference on Very large data bases, pages 1263--1266. VLDB Endowment, 2005.
[4]
Y. Benkler. The Wealth of Networks: How Social Production Transforms Markets and Freedom. Yale University Press, 2006.
[5]
C. Bettstetter, H. Hartenstein, and X. Perez-Costa. Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5):555--567, 2004.
[6]
S. B. B. Carpenter. Middleboxes: Taxanomy and issues. RFC 3234, Feb. 2002.
[7]
K. Cho, J. Choi, D. il Diko Ko, T. Kwon, and Y. Choi. Content-oriented networking as a future internet infrastructure: Concepts, strengths, and application scenarios. In Proc. of International Conference on Future Internet Technologies (CFI), June 2008.
[8]
Chris Ziegler. At&t issues official statement on slingplayer's 3g blackout for iphone. http://bit.ly/N5jOt, 2009.
[9]
A. Crespo and H. Garcia-Molina. Semantic overlay networks for p2p systems. Lecture Notes in Computer Science, 3601:1--13, 2005.
[10]
ecoustics.com. Mobile internet / video usage growing. http://bit.ly/MCb7u, 2009.
[11]
Frost & Sullivan. Emergence of broadband wireless to drive adoption of mobile video in the u.s. http://bit.ly/JtFZa, 2009.
[12]
J. Rosenberg and J. Weinberger and C. Huitema and R. Mahy. Stun - simple traversal of user datagram protocol (udp) through network address translators (nats). RFC 3489 (Proposed Standard), 2003.
[13]
S. Michel, M. Bender, P. Triantafillou, and G. Weikum. Iqn routing: Integrating quality and novelty in p2p querying and ranking. Lecture Notes in Computer Science, 3896:149--166, 2006.
[14]
Nilay Patel. At&t tweaks wireless terms of service to forbid video streaming, filesharing, data tethering. http://bit.ly/10kBbL, 2009.
[15]
J. X. Parreira, S. MichelCorresponding, and G. Weikuma. p2pdating: Real life inspired semantic overlay networks for web search. Information Processing & Management, 43(3):643--664, 2007.
[16]
A. R. Prasad, N. R. Prasad, A. Kamerman, H. Moelard, and A. Eikelenboom. Indoor wireless lans deployment. In Vehicular Technology Conference Proceedings, 2000 (VTC 2000), 2000.
[17]
M. Ripeanu and I. Foster. Mapping gnutella network: Macroscopic properties of large-scale peer-to-peer systems. 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), March 2002.
[18]
N. Sastry, J. Crowcroft, and K. Sollins. Architecting citywide ubiquitous wi-fi access. HotNets-VI, November 2007.
[19]
A. Saunder. Skyhook: how iphone os 3.0 delivers location services. http://bit.ly/aOqzw, 2009.
[20]
Sharman Networks Ltd. How peer-to-peer (p2p) and kazaa software works. http://www.kazaa.com/us/help/new_p2p.htm.
[21]
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw., 11(1):17--32, 2003.
[22]
V. Jacobson and M. Mosko and D. Smetters and J. J. Garcia-Luna-Aceves. Content-centric networking: Whitepaper describing future assurable global networks. Presented in response to DARPA Assurable Global Networking RFI SN07-12.

Cited By

View all
  • (2015)Timing Attacks on Access Privacy in Information Centric Networks and CountermeasuresIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2014.238259212:6(675-687)Online publication date: 1-Nov-2015

Index Terms

  1. Decentralized and autonomous content overlay networking (DACON) with WiFi access points

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CFI '10: Proceedings of the 5th International Conference on Future Internet Technologies
    June 2010
    96 pages
    ISBN:9781450302302
    DOI:10.1145/1853079
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • AsiaFI: Asia Future Internet
    • FIF: Future Internet Forum

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 June 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. content-centric networks
    2. peer-to-peer
    3. pervasive computing

    Qualifiers

    • Research-article

    Conference

    CFI '10
    Sponsor:
    • AsiaFI
    • FIF

    Acceptance Rates

    Overall Acceptance Rate 29 of 55 submissions, 53%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2015)Timing Attacks on Access Privacy in Information Centric Networks and CountermeasuresIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2014.238259212:6(675-687)Online publication date: 1-Nov-2015

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media