2005
DOI: 10.1007/11422778_98
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach for Transparent Bandwidth Conservation

Abstract: Abstract-As broadband Internet access becomes more widespread, demand for rich multimedia content will increase significantly. When this trend is coupled with the point-to-point nature of the Internet, it is only natural that there will be an increase in redundant network traffic. Hence, a wide variety of techniques have been developed to eliminate redundant traffic in the network ranging from multicast to caching. Multicast techniques suffer from deployment issues, while caching techniques offer limited benef… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2007
2007
2013
2013

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 16 publications
0
1
0
Order By: Relevance
“…The wireless stealth multicast technique: In this technique, a minor amount of packet delay is used to detect and eliminate redundancy in the network. This technique represents an extension of the work done in [3], and adopts stealth multicast to the wireless domain. Redundancy in the wireless network is detected at the base station and condensed into a broadcast for transmission across the wireless domain.…”
Section: Introductionmentioning
confidence: 99%
“…The wireless stealth multicast technique: In this technique, a minor amount of packet delay is used to detect and eliminate redundancy in the network. This technique represents an extension of the work done in [3], and adopts stealth multicast to the wireless domain. Redundancy in the wireless network is detected at the base station and condensed into a broadcast for transmission across the wireless domain.…”
Section: Introductionmentioning
confidence: 99%