Abstract

Interactive mobile applications require a highly available multicast service for information dissemination and collaboration, while being able to withstand mobility-induced network connectivity problems. However, efficient and reliable wireless multicast has remained a difficult challenge. We propose a novel wireless multicast scheme that allows more efficient and mobility-proof multicast in mobile cloud environments. Our scheme uses a distributed caching and deferred acknowledgement (ACK) technique to reduce delivery ACK traffic during a multicast session. Packets with pending ACK are cached in selected network nodes to provide fast re-delivery. A distributed multicast tree construction algorithm is also utilized to provide fast topology repair under dynamic network conditions. The tree maintenance requires each node to keep track of its 2-hop neighborhood connectivity. Our scheme’s ability to overcome frequent network topology changes leads to a low message exchange overhead to correct local topology errors.

Keywords

multicast mobile cloud reliability mobility fail-recovery MAC protocol wireless network 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Wu, J.: Dominating-Set-Based Routing in Ad Hoc Wireless Networks with Unidirectional Links. Trans. Parallel and Distributed Systems 13(9), 866–881 (2002)CrossRefGoogle Scholar
  2. 2.
    Dai, F., Wu, J.: An Extended Localized Algorithm for Connected Dominating Set Formation in Ad Hoc Wireless Networks. IEEE Trans. Parallel and Distributed Systems 15(10), 908–920 (2004)CrossRefGoogle Scholar
  3. 3.
    Qayyum, A., Viennot, L., Laouiti, A.: Multipoint relaying for flooding broadcast messages in mobile wireless networks. In: Proceedings of the Hawaii International Conference on System Sciences (HICSS 2002) (January 2002)Google Scholar
  4. 4.
    Wan, P.-J., Alzoubi, K.M., Frieder, O.: Distributed construction of connected dominating set in wireless ad hoc networks. In: Proceedings of Infocom 2002 (2002)Google Scholar
  5. 5.
    Guha, S., Khuller, S.: Approximation Algorithms for Connected Dominating Sets. Algorithmica 20(4), 374–387 (1998)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Alzoubi, K.M., Wan, P.-J., Frieder, O.: Distributed Heuristics for Connected Dominating Set in Wireless Ad Hoc Networks. IEEE ComSoc/KICS Journal on Communication Networks 4(1), 22–29 (2002)CrossRefGoogle Scholar
  7. 7.
    Stojmenovic, I., Seddigh, M., Zunic, J.: Dominating sets and neighbor elimination based broadcasting algorithms in wireless networks. In: Proc. IEEE Hawaii Int. Conf. on System Sciences (January 2001)Google Scholar
  8. 8.
    Armbrust, M., Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Stoica, I., et al.: Above the clouds: A berkeley view of cloud computing. EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2009-28 (2009)Google Scholar
  9. 9.
    Pering, T., Want, R., Rosario, B., Sud, S., Lyons, K.: Enabling Pervasive Collaboration with Platform Composition. In: Tokuda, H., Beigl, M., Friday, A., Brush, A.J.B., Tobe, Y. (eds.) Pervasive 2009. LNCS, vol. 5538, pp. 184–201. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  10. 10.
    Lyons, K., Pering, T., Rosario, B., Sud, S., Want, R.: Multi-display Composition: Supporting Display Sharing for Collocated Mobile Devices. In: Gross, T., Gulliksen, J., Kotzé, P., Oestreicher, L., Palanque, P., Prates, R.O., Winckler, M. (eds.) INTERACT 2009, Part I. LNCS, vol. 5726, pp. 758–771. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  11. 11.
    Li, X., Zhang, H., Zhang, Y.: Deploying Mobile Computation in Cloud Service. In: Jaatun, M.G., Zhao, G., Rong, C. (eds.) CloudCom. LNCS, vol. 5931, pp. 301–311. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Chun, B., Maniatis, P.: Augmented Smartphone Applications Through Clone Cloud Execution. In: Proceedings of USENIX HotOS XII (2009)Google Scholar
  13. 13.
    Zhang, X., Schiffman, J., Gibbs, S., Kunjithapatham, A., Jeong, S.: Securing elastic applications on mobile devices for cloud computing. In: Proceedings of the ACM Workshop on Cloud Computing Security, pp. 127–134 (2009)Google Scholar
  14. 14.
    Angin, P., Bhargava, B., Helal, S.: A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation. In: Eleventh International Conference on Mobile Data Management, pp. 396–401 (2010)Google Scholar
  15. 15.
    Wieselthier, J.E., Nguyen, G.D., Ephremides, A.: Algorithms for Energy-Efficient Multicasting in Static Ad Hoc Wireless Networks. Mobile Networks and Applications (MONET) 6(3), 251–263 (2001)CrossRefMATHGoogle Scholar
  16. 16.
    Ramani, S., Savage, S.: Syncscan: Practical Fast Handoff for 802.11 Infrastructure Networks. In: Proc. of IEEE7 INFOCOM (March 2005)Google Scholar
  17. 17.
    Wang, J., Wang, X.: An energy-efficient,distributed wireless multicast protocol based on concurrent CTS and N 2 connectivity. Wireless Network 16, 2031–2048 (2010)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2012

Authors and Affiliations

  • Ju Wang
    • 1
  • Hui Chen
    • 1
  • Kostadin Damevski
    • 1
  • Jonathan Liu
    • 2
  1. 1.Virginia State UniversityPetersburgUSA
  2. 2.University of FloridaGainesvilleUSA

Personalised recommendations