An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications
In a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another. Given that shared data may have high correlation with new data to transmit, we question how such sh...
Published in: | IEEE Transactions on Mobile Computing |
---|---|
Main Authors: | , , , |
Format: | Article in Journal/Newspaper |
Language: | unknown |
Published: |
Institute of Electrical and Electronics Engineers
2019
|
Subjects: | |
Online Access: | https://scholarworks.unist.ac.kr/handle/201301/27816 https://doi.org/10.1109/TMC.2019.2940578 https://ieeexplore.ieee.org/document/8827967 |
id |
ftuisanist:oai:scholarworks.unist.ac.kr:201301/27816 |
---|---|
record_format |
openpolar |
spelling |
ftuisanist:oai:scholarworks.unist.ac.kr:201301/27816 2023-05-15T18:32:41+02:00 An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications Nam, Wooseung Lee, Joohyun Shroff, Ness B. Lee, Kyunghan 2019-09 https://scholarworks.unist.ac.kr/handle/201301/27816 https://doi.org/10.1109/TMC.2019.2940578 https://ieeexplore.ieee.org/document/8827967 ?????? unknown Institute of Electrical and Electronics Engineers IEEE TRANSACTIONS ON MOBILE COMPUTING 1536-1233 https://scholarworks.unist.ac.kr/handle/201301/27816 33617 doi:10.1109/TMC.2019.2940578 https://ieeexplore.ieee.org/document/8827967 ARTICLE ART 2019 ftuisanist https://doi.org/10.1109/TMC.2019.2940578 2022-05-15T05:33:38Z In a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another. Given that shared data may have high correlation with new data to transmit, we question how such shared data can be best utilized to improve the efficiency of data transmission. To answer this, we develop an inter-data encoding technique, SyncCoding, that effectively replaces bit sequences of the data to be transmitted with the pointers to their matching bit sequences in the shared data so called references. By doing so, SyncCoding can reduce data traffic, speed up data transmission, and save energy consumption for transmission. Our evaluations of SyncCoding implemented in Linux show that it outperforms existing popular encoding techniques, Brotli, LZMA, Deflate, and Deduplication. The gains of SyncCoding over those techniques in the perspective of data size after compression in a cloud storage scenario are about 12.5%, 20.8%, 30.1%, and 66.1%, and are about 78.4%, 80.3%, 84.3%, and 94.3% in a web browsing scenario, respectively. Article in Journal/Newspaper The Pointers ScholarWorks@UNIST (Ulsan National Institute of Science and Technology) IEEE Transactions on Mobile Computing 20 1 76 92 |
institution |
Open Polar |
collection |
ScholarWorks@UNIST (Ulsan National Institute of Science and Technology) |
op_collection_id |
ftuisanist |
language |
unknown |
description |
In a variety of network applications, there exists significant amount of shared data between two end hosts. Examples include data synchronization services that replicate data from one node to another. Given that shared data may have high correlation with new data to transmit, we question how such shared data can be best utilized to improve the efficiency of data transmission. To answer this, we develop an inter-data encoding technique, SyncCoding, that effectively replaces bit sequences of the data to be transmitted with the pointers to their matching bit sequences in the shared data so called references. By doing so, SyncCoding can reduce data traffic, speed up data transmission, and save energy consumption for transmission. Our evaluations of SyncCoding implemented in Linux show that it outperforms existing popular encoding techniques, Brotli, LZMA, Deflate, and Deduplication. The gains of SyncCoding over those techniques in the perspective of data size after compression in a cloud storage scenario are about 12.5%, 20.8%, 30.1%, and 66.1%, and are about 78.4%, 80.3%, 84.3%, and 94.3% in a web browsing scenario, respectively. |
format |
Article in Journal/Newspaper |
author |
Nam, Wooseung Lee, Joohyun Shroff, Ness B. Lee, Kyunghan |
spellingShingle |
Nam, Wooseung Lee, Joohyun Shroff, Ness B. Lee, Kyunghan An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
author_facet |
Nam, Wooseung Lee, Joohyun Shroff, Ness B. Lee, Kyunghan |
author_sort |
Nam, Wooseung |
title |
An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
title_short |
An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
title_full |
An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
title_fullStr |
An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
title_full_unstemmed |
An Inter-data Encoding Technique that Exploits Synchronized Data for Network Applications |
title_sort |
inter-data encoding technique that exploits synchronized data for network applications |
publisher |
Institute of Electrical and Electronics Engineers |
publishDate |
2019 |
url |
https://scholarworks.unist.ac.kr/handle/201301/27816 https://doi.org/10.1109/TMC.2019.2940578 https://ieeexplore.ieee.org/document/8827967 |
genre |
The Pointers |
genre_facet |
The Pointers |
op_relation |
IEEE TRANSACTIONS ON MOBILE COMPUTING 1536-1233 https://scholarworks.unist.ac.kr/handle/201301/27816 33617 doi:10.1109/TMC.2019.2940578 https://ieeexplore.ieee.org/document/8827967 |
op_doi |
https://doi.org/10.1109/TMC.2019.2940578 |
container_title |
IEEE Transactions on Mobile Computing |
container_volume |
20 |
container_issue |
1 |
container_start_page |
76 |
op_container_end_page |
92 |
_version_ |
1766216880690823168 |