Managing Redundant Content in Bandwidth Constrained Wireless Networks

Tuan Dao, Amit K. Roy-Chowdhury, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Tom La Porta

Research output: Contribution to journalArticlepeer-review

8 Scopus citations


Images/videos are often uploaded in situations like disasters. This can tax the network in terms of increased load and thereby upload latency, and this can be critical for response activities. In such scenarios, prior work has shown that there is significant redundancy in the content (e.g., similar photos taken by users) transferred. By intelligently suppressing/deferring transfers of redundant content, the load can be significantly reduced, thereby facilitating the timely delivery of unique, possibly critical information. A key challenge here however, is detecting 'what content is similar,' given that the content is generated by uncoordinated user devices. Toward addressing this challenge, we propose a framework, wherein a service to which the content is to be uploaded first solicits metadata (e.g., image features) from any device uploading content. By intelligently comparing this metadata with that associated with previously uploaded content, the service effectively identifies (and thus enables the suppression of) redundant content. Our evaluations on a testbed of 20 Android smartphones and via ns3 simulations show that we can identify similar content with a 70% true positive rate and a 1% false positive rate. The resulting reduction in redundant content transfers translates to a latency reduction of 44 % for unique content.

Original languageEnglish (US)
Article number7737063
Pages (from-to)988-1003
Number of pages16
JournalIEEE/ACM Transactions on Networking
Issue number2
StatePublished - Apr 2017

All Science Journal Classification (ASJC) codes

  • Software
  • Computer Science Applications
  • Computer Networks and Communications
  • Electrical and Electronic Engineering


Dive into the research topics of 'Managing Redundant Content in Bandwidth Constrained Wireless Networks'. Together they form a unique fingerprint.

Cite this