A Novel Interest Detection-Based Video Dissemination Algorithm under Flash Crowd in Mobile Ad Hoc Networks

The peer-to-peer-based video resource dissemination is important for handling extreme conditions such as flash crowds which severely break the balance between supply and demand of video content and bring negative effects for quality of service (QoS). In this paper, we propose a novel interest detection-based video dissemination algorithm under flash crowd in mobile ad hoc networks (IDVD). IDVD classifies the user behavior of requesting video content in terms of the popularities and playback time of video and considers the demand of popular video as the cause of flash crowd. IDVD makes use of the prediction of necessary bandwidth and period time of intensive request to be aware of period time and scale of flash crowd. IDVD employs a resource dissemination algorithm which can fast discover interested nodes and achieve the on-demand dissemination of video resources in neighboring geographical area, in order to handle imbalance between supply and demand. IDVD uses the epidemic model to describe the state transition of nodes and define the convergence condition of resource dissemination algorithm. Extensive tests show how IDVD achieves much better performance results in comparison with other state of the art solutions.


Introduction
The mobile ad hoc networks (MANETs) rely on packets hopping between nodes which act as hosts and routers to achieve communication of nodes, so they are well known for flexible architectures and rapid deployment [1,2].The multimedia streaming services are more popular applications in Internet and mobile Internet [3][4][5][6][7][8][9][10]. The deployment of video services in MANETs supports ubiquitous access for the mobile users, enhancing user experience [11,12].P2P technologies provide the solution for large-scale video sharing in wireless networks such as MANETs and wireless sensor networks (WSNs), so that the mobile users conveniently fetch desired video content from the peers [13][14][15][16][17].The video with wonderful content always attracts mass peers to seek and download the resources from other peers or the media server.However, the relatively limited network bandwidth and capacities of mobile nodes cannot afford traffic requirement caused by intensive resource request, reducing quality of service (QoS).Therefore, a solution based on green communication requirement, which can understand behavior of pursuing popular video content, fast discover the nodes of cooperatively caching resources, and efficiently spread video content should be considered for video streaming system in MANETs.
The flash crowds lead to serious imbalance between supply and demand for video streaming resources and bring negative influence in the scalability and QoS of video streaming systems.For instance, the blowout of video resource request results in the long delay of response and network congestion.The mass researchers recently focus on the study of flash crowd in order to improve QoS of video streaming system and reduce the cost of system deployment [18][19][20].A fluidbased model for P2P live streaming systems was proposed in [18], which describes the relationship between the system capacity, peer startup latency, and system recovery time with and without admission control.A mathematical model proposed in [19] captures the relationship between time and scale in P2P live streaming systems and designs a principle of scale control.A model proposed in [20] predicts the scalability of system with increasing number of nodes and provides enough upload bandwidth for sudden resource request according to the estimation of server bandwidth, so as to ensure high QoS.The aforementioned solutions focus on modeling the living streaming systems to address the influence of flash crowd and are unsuitable for the mobile environment with limited network resources and high mobility of mobile nodes.The high-efficiency video resource sharing in wireless networks also is important solution for handling flash crowd.The management of video resources regulates distribution of resources in terms of dynamic user demand, which fast perceives and responds to the variation of video resource demand.The video resource dissemination strategies can fast spread requested resources in overlay networks, which reduce recovery time of balance between supply and demand.Therefore, an efficient solution based on dynamic balance between supply and demand, which supports fast video resource dissemination and efficiently prevents the degraded QoS should be considered for P2P-based video streaming systems over wireless mobile networks.
In this paper, we propose a novel interest detection-based video dissemination algorithm under flash crowd in mobile ad hoc networks (IDVD).By the analysis of resource request behavior of users and the estimation of the popularities of video resources, IDVD constructs a novel "H"-model to explain that the intensive request of popular video content is the main cause of the flash crowd in multimedia streaming system.IDVD makes use of the historical information (e.g., bandwidth and period time) of large-scale request for popular video content to predict the period time and scale of flash crowd.IDVD designs a novel resource dissemination algorithm which can fast spread resources to meet the demand of upload bandwidth.In order to reduce the cost of resource dissemination, the resource carriers only search and spread the interested mobile nodes in neighboring geographical area and dynamically regulate range of dissemination in terms of predicted necessary bandwidth and capacities of carriers.IDVD uses the epidemic model to describe the dissemination process of resources and state transition of nodes and define convergence condition of spreading process.Simulation results show how IDVD achieves much better performance results in comparison with other state of the art solutions.

Related Work
The video system models under flash crowd have attracted increasing research interests from various researchers.For instance, a fluid-based model for P2P live streaming systems was proposed in [18], which studies the relationship between capacity and recovery time of system and peer startup latency with and without admission control for flash crowds.In the systems without admission control, this paper finds that there is an independent relationship between the capacity and initial state of system while power law decreases with the departure rate of stable peers.The paper also shows that the admission control can help the system relieve the large flash crowds in the systems with admission control and proposed the flash crowd handling strategies in order to satisfy the peer startup performance under various circumstances.The mathematical framework in [19] researches the inherent relationship between time and scale of P2P live streaming system during a flash crowd.The population control procedure improves the system scale by trading peer startup delays.This paper also analyzed the effects of partial knowledge of peers and the competition of limited upload bandwidth resources between peers.Moreover, an analytical model in [20] for flash crowds is based on the evolution of the utilization of available bandwidth at peer side in order to investigate impact of the utilization of available bandwidth.The model can predict the system scalability with increasing number of nodes and provide necessary bandwidth for sudden request.
Recently, some researchers focus on the resource management strategies in order to optimize resource distribution and make the balance between supply and demand.Kozat et al. proposed a hybrid P2P video-on-demand architecture, which improves transmission efficiency of popular videos [21].In this architecture, each system member caches a video chunk and makes use of surplus upload bandwidth to serve other nodes.The server schedules the video resources in the system to respond to the request of nodes and provide reliable streaming service.In order to balance the load between server and system members, the architecture considered the caching problem as a utility optimization problem based on supply and demand and used the multiple caching mechanisms to optimize the performance of system.PECAN in [22] proposed a peer cache adaptation strategy, in which each peer dynamic regulates the local storage capacity to improve the scalability of system.PECAN employs a cache replacement algorithm to improve the resource distribution in terms of the popularities of video chunk and show that the storage capacities of peers are corresponding to the request rate of resources.PECAN designed a distributed reputation and monitoring system to discover selfish peers.
Moreover, some file (video) resource dissemination algorithms recently are proposed.For instance, Mokhtarian and Hefeeda show that the problem of allocating the seed server capacity is NP-complete and proposed a seeding capacity allocation algorithm to address the optimal allocation problem [23].The paper proposed an analytical model to predict the performance of P2P-based video system by using an allocation algorithm, which estimates the longterm network throughput according to video quality and total served bitrate.Venkatramanan and Kumar analyzed the evolution process of the interest in the content under the linear threshold model and made use of an epidemic spread model to control the content copying process [24].This paper modeled the coevolution process of popularity and delivery of video content according to homogeneous influence linear threshold model.This paper used fluid limit ordinary differential equations to provide the selection of parameters for the control of content suppliers and address optimization problems for content delivery.Altman et al. proposed an extensional epidemic model to characterize file sharing behavior in P2P networks including free-riding peers [25].This paper modeled P2P network dynamics by a Markov chain, where the state of P2P system evolves from branching process to a supercritical P2P swarm with increasing network size.The paper shows that there are the phase transitions; the small change of parameters causes a large change in the network behavior for two models of epidemic and branching.

IDVD Detailed Design
3.1.Media Server.The video resources are stored at the media server in order to provide original video data for all mobile nodes in MANETs; namely, a video file set is defined as   = ( 1 ,  2 , . . .,   ).When the server receives a request message, it assigns a candidate supplier which caches the requested file for the requester and adds the information of requester into local node set   = {( 1 ,   ,  1 ), ( 2 ,   ,  2 ), . . ., (  ,  ℎ ,   )} where  denotes the requested video file and  is the timestamp of joining system of nodes.The nodes also contact other system members to obtain desired resources, which is detailed next.A system member which leaves system sends a quit message containing the information of played files and corresponding playback start-stop timestamp (local system time of node) to the server.The server considers this information as playback logs and analyzes these logs to be aware of the condition of request and playback of resources such as the file popularity and the mean playback time of video files.The popularities of items in   follow a Zipf distribution [26,27] and the popularity value of each file   can be obtained according to where   is the access frequency of   and ∑  =1   is the total access frequency of all files.The mean playback time ratio of video file   is defined as where   is playback time of th user,   is the length of video   , and   is the total number of users which have watched   .We use the mean playback time ratio of   as weight value of popularities, so the weighted popularities of   can be defined as pop   =   × pop  .The files whose weighted popularities are larger/less than (1/) ∑  =1 pop   (average value of weighted popularities of  files) are popular/unpopular.In terms of the fetched content, the user playback behavior can be classified as (1) the users which are watching popular files request popular files; (2) the users which are watching unpopular files request popular files; (3) the users which are watching unpopular files request unpopular files; (4) the users which are watching popular files request unpopular files.As Figure 1 shows, the popular/unpopular files and channels between them form an "H"-model".The first and second kind behaviors generate the traffic to the popular files, namely, the channel   ; the third and fourth kind behaviors form the traffic of channel   .The popular content always can attract more users, namely, the traffic value in   is far greater than that in   .The less active system members in   do not require mass upload bandwidth, but this leads to the shortage of available resources.For instance, if there are less nodes which cached these files and have the asynchronous playback point with the requesters in overlay networks, this leads to fragile logical link between suppliers and requesters due to dynamic resource demand.The requesters need to fetch desired resources from the server.If there are no requested resources in overlay networks, the server needs to provide the initial streaming data for the requesters.Therefore, the shortage of available resources causes too much intervention of server for scheduling resources, which increases the load of server.We make use of distributed hash table (DHT) to group these system members in   [28] and optimize the resource distribution according to cooperative cache strategies [29,30], which can improve the efficiency of sharing resources and reduce the load of server.
The demand from the large number of nodes for popular video is one of the main causes of flash crowd in   .The transient large-scale request breaks the balance between supply and demand for upload bandwidth, which results in high serving delay and the overload of server.The server needs to be aware of the bandwidth requirement level and period time of intensive request in advance.The huge traffic in   usually is the main reason for the system bottleneck, so we introduce the traffic prediction scheme for any popular video   in   .The length of   is defined as a period time.We use an average value of traffic during each period time to define the channel traffic set; namely,    = (  1 ,   2 , . . .,    ) where any average traffic value can be obtained by where Because the random traffic values are difficult to form a stable predictable variation trend, we make use of the Grey Forecast Model GM( () ) [31,32]; the first-order differential equation of GM( () ) is defined as  (1)   +  (1) = ℎ, where  is the time series variable and  is the series variable of traffic accumulation with increasing time interval. and ℎ denote the grey level of development and control, respectively.We use the ordinary least square method to solve the values of  and ℎ according to where r and ĥ are the solutions of  and ℎ, respectively.  is the transposition matrix of  and  = (  2 ,   3 , . . .,    )  .Equation ( 7) denotes the solution of ( 5) by using r and ĥ: b ( + 1) = (  1 − ĥ r )  −r + ĥ r .
b( + 1),  ≤ , is the fitting value; b( + 1),  > , is the forecast value; namely, we compare b( + 1),  > , with the upper limit of server load to make a decision whether to spread   in networks.We use a posteriori variance ratio  ()  and an occurrence probability  () to ensure the confidence level of prediction values. () and  () are defined as where () is the residual value; namely, () =    − b(),  = 2, 3, . . ., .  and  are the residual mean value and variance, respectively, according to and  mean are the variance and mean value of items in  ()     according to () and  () can reflect the confidence level of prediction values of channel traffic, so we make use of two threshold values  () and  () in terms of the Grey Forecast Model to measure the confidence level.If  () ≥  () and  () ≥  () , the prediction value is credible.When the prediction value b(),  >  − 1, is credible and is larger than the summation of upload bandwidth known by the server (total bandwidth of the server and items in   ), the server sends a message containing b() to the nodes which store   in   and are considered as the carriers of   .These carriers return a statistical information about available upload bandwidth to the server by collecting the upload bandwidth from the nodes which are downloading   from the carriers.If b() still is larger than the summation of upload bandwidth, the server requires these nodes to fast disseminate   in order to cope with intensive request.

Resource Disseminate Model.
In order to reduce the load of server, the server only sends a message containing necessary upload bandwidth b() and a carrier list to each carrier.The carriers are responsible for controlling the dissemination process by the message exchange.We use a token-based message exchange strategy to achieve the synchronization of information between carriers.Each item in the carrier list has a random number and successively sends the message to other carriers according to the value of number.For instance, the number of items in the list is .The  − 1 carriers send collected information (e.g., the number of discovered nodes which are interested in the resources) to th carrier   which has the token.After   handles these received messages, it returns a message containing the calculation results to other carriers.Meanwhile,   turns the token over to  − 1th carrier.After the carrier with the smallest number return message to other carriers, it returns the token over to   .The token-based exchange strategy can balance the load between carriers and does not cause high message overhead.
When these carriers receive the request of spreading   from the server, they start to discover interested nodes (INs) and require INs caching   .The INs include two types of nodes: the interested mobile nodes (IMNs) and the interested system members (IMs) which are playing other videos.The carriers also are considered as the inquirers due to searching the INs.In order to reduce the cost of spreading   , we employ a guidance-based dissemination strategy to implement geographic region-based file diffusion.
Each inquirer   makes use of cross-layer method to add the information of viewing file (current playback state) to one-hop multicast message at the MAC layer.If there are the system members in the one-hop neighbor nodes of   , these members return the information of current played video file.Moreover, if the one-hop neighbor nodes are interested in   , they also add an interest mark into the return messages.When   has exchanged messages with the one-hop nodes, it records the information of played content of one-hop nodes and stores the information of INs.We set a variable period time  for the above neighbor node discovery process according to our previous work in [33].The nodes dynamically change their own  in terms of the variation level of mobility of one-hop nodes.
needs to select an IMs   from an encountered node list   during recent  update period as a cooperative inquirer.The list is defined as   = {( 1 ,  1 ,   ), ( 2 ,  2 ,   ), . . ., (  ,   ,  ℎ )} where  is the encountered timestamp and  denotes the viewing file in the process of encounter.  has the nearest encountered timestamp and does not cache   .  requires that   continues to search the INs from its one-hop nodes and select next cooperative inquirer from   .  sends a message containing the condition of convergence of iterative search to   (for instance, the number of iteration is defined as  times).After   has inquired for its one-hop nodes,   delivers the collected information of the INs to the selected next cooperative inquirer.After the th cooperative inquirer has inquired, it directly returns the collected information of INs to   .Because the mobile nodes may be inquired by multiple inquirers or cooperative inquirers, we define the following rule in order to ensure the accuracy of statistical information in the process of inquiry.(1) If a node has sent the interest mark to an inquirer or a cooperative inquirer, it only return the message containing uninterested mark after the reception of inquiry message of other inquirers or cooperative inquirers; (2) a node cannot become the cooperative inquirer of two carriers in the same process of inquiry; (3) the carriers cannot become the cooperative inquirers of other carriers.
After   receives and stores the collected information of INs from the th cooperative inquirer, it keeps the contact with discovered INs and forwards the messages to the carrier   which has the token.When   receives the information of discovered INs from all carriers, it estimates needed number of INs.We make use of the epidemic model (SIR) to calculate needed number of INs.All parameters of the epidemic model are listed in the Notations.The necessary and sufficient condition of implementing SIR model is defined as   >   ,   = b()/  where   denotes needed number of nodes which store   and   is the transmission rate of   .If   <   ,   requires that the carriers continue to search more INs.Once the carriers find the IMs, they transmit the data of   to the IMs; namely, the IMs can be immediately infected.However, the IMNs are considered as the potential infected nodes so that the carriers do not require them to cache   at once.The dynamic number of carriers leads to the change of available upload bandwidth.For instance, the carriers which have watched the whole video content remove   from local buffer.When the inquirers do not discover more IMs to meet the demand of bandwidth due to the limited detection range, they require that the IMNs cache   .The IN discovery rate DR  of any inquirer   is defined as where We obtain the solution of the above differential equation; namely,  =  0 +  0 −  + (/) ln(/ 0 ).Further, we can obtain the solution of  according to known value of  0 ,  0 , , , and , namely, Ŝ = (− − 0 − 0 −ln  0 )/ −  where  is the Lambert  Function and  =   /  .Ŝ is the needed number of INs in order to ensure the required scale of nodes cached   based on current spreading rate.  reassigns the needed number of INs for the carriers according to the collected number of inquired nodes of carriers during an inquiry period and requires that the carriers continue to find new INs.The more the number of inquired nodes of a carrier is, the higher the probability of discovering INs is.Therefore, the carriers which have more inquired nodes should be assigned more number of IN discovery.The above process is considered as an IN discovery period.  turns the token to next carrier after a discovery period.If the total number of discovered INs is equal to or greater than Ŝ, the carrier which has the token requires that the carriers keep the state of equalisation during predicted period time   .After the system went through   , the carriers disconnect the contact with all INs.

Testing and Test Results Analysis
We investigate the performance of the proposed IDVD in comparison with HILT-SI model [24].We chose a 100-second long video clip   which is considered as copied content.IDVD was modeled and implemented in NS-2, as described in the previous sections.1 lists some NS-2 simulation parameters of the MANET for the two solutions.We define initial random speed and target location of movement for all mobile nodes.After the mobile nodes arrive at the target location, they continue to move according to newly assigned speed and target location of movement.All mobile nodes follow the above iteration of moving behavior during the whole simulation time.The default distance between server and nodes is set to 6 hops in order to ensure the consistency of cost of accessing to the server for all mobile nodes.The variation of default distance can influence the cost of fetching video content from the server.For instance, the increase/decrease of default distance brings high/low transmission delay of video data and packet loss rate.Initially, there are 200 system members where 20 members play   and 80 members are uninterested in   .50 members which are viewing another video want to watch   and 50 members request   per 0.5 s from 80 s to 105 s.Moreover, As Figure 2 shows, HILT-SI's blue curve has slow rise from  = 100 s to  = 200 s after fast increase from  = 0 s to  = 80 s, after IDVD's red curve also has a slow increase from  = 80 s to  = 200 s after fast rise from  = 0 s to  = 60 s.The increment of HILT-SI curve is larger than that of IDVD and HILT-SI has a longer increase period time than that of IDVD; namely, HILT-SI nearly searches all interested nodes.Figure 3 presents the variation of number of carriers in the video system with increasing simulation time.The blue curve corresponding to HILT-SI's results experiences a fast decrease from  = 120 s to  = 200 s after it suddenly reaches the peak value 143 at  = 100 s.IDVD's red curve also has similar trend; namely, it has a slow rise, suddenly arrives at the peak value 116 at  = 100 s, and fast falls from  = 120 s to  = 200 s.HILT-SI's results are both higher values and larger fluctuation than those of IDVD during whole simulation time.

Testing Topology and Scenarios. Table
In HILT-SI, the carriers continually influence the nodes connected with them according to the given threshold.When the nodes do not become interested nodes, the influence values of carriers increase by the accumulation so that the state of influenced nodes finally becomes interested and these new interested nodes help the carriers influence other nodes by making use of its own influence value.Because the server periodically broadcasts the state of all nodes in the whole network, all INs and carriers try to influence other potential INs.The efficiency of IN discovery HILT-SI is higher than that of IDVD.When the potential INs become new INs, they cache and play   ; namely, these new INs immediately become new carriers after they fetch   .In HILT-SI, the number of carriers has a slow increase from  = 20 s to  = 80 s.50 members suddenly join the system and request   from  = 80 s to  = 105 s, so the number of carriers fast reaches the peak value.With increasing simulation time, the initial carriers International Journal of Distributed Sensor Networks needs to consume the large number of network bandwidth to maintain the process of fast discovery.In IDVD, the carriers only inquire the small number of system members and detect the mobile nodes in one-hop range.Moreover, the tokenbased message exchange strategy also reduces the message exchange between carriers.Therefore, IDVD's message cost can maintain lower level than that of HILT-SI.By regulating the values of  and  to change the range of IN discovery, IDVD can control the range of resource dissemination and adapt dynamic network environment.
Average Data Transmission Delay.We calculate the transmission delay of received video data at application layer during each time slice according to where   is the time slice,  is the number of all received data during a time slice,   denotes the delay of received th data, and ∑  =1   is the sum of delay of all received data during a time slice.In terms of the settings of simulation time and the defined strategies of requesting resources, the value of   is set to 20 s.
As Figure 5 shows, HILT-SI's blue curve experiences a slight fluctuation from  = 20 s to  = 80 s and fast decreases from  = 140 s to  = 200 s after suddenly reaching the peak value 3.3 s at  = 120 s.The red curve corresponding to IDVD's results fast reaches the peak value 2.89 s at  = 120 s after having a slow increase from  = 20 s to  = 80 s and it falls from  = 140 s to  = 200 s.IDVD's delay is roughly 20% better than the values associated with HILT-SI.
In HILT-SI, the carriers and INs fetch the information of nodes from the broadcast messages.They make use of logical connection with the INs to push the video content.HILT-SI does not consider the geographical location relationship between carriers and INs, so that the average data transmission delay maintains higher level than that of IDVD.Moreover, when the large number of request suddenly arrives, the nodes do not assume huge network traffic so International Journal of Distributed Sensor Networks as to result in the network congestion from  = 100 s to  = 140 s.Therefore, HILT-SI's delay is higher than that of IDVD.In IDVD, the members and mobile nodes are aware of resource information by receiving push messages of inquirers and cooperative inquirers.They fetch the video content from neighbor carriers.The local resource dissemination and the small number of video streaming relative to HILT-SI (the number of INs in IDVD is less than that of HILT-SI) do not consume more bandwidth of other relay nodes.Therefore, IDVD's peak value is less than that of HILT-SI and the time of duration of network congestion is shorter than that of HILT-SI.

Packet Loss Rate (PLR).
The ratio between the number of packets lost in the process of video data transmission and the total number of packets of video data sent is defined as PLR.
As Figure 6 shows, the curves corresponding to HILT-SI and IDVD show a fall after rise with increasing simulation time.The results of HILT-SI and IDVD maintain low levels from  = 20 s to  = 80 s and fast increase from  = 100 s to  = 120 s and reach the peak values, respectively.The PLR values of HILT-SI and IDVD fast decrease from  = 140 s to  = 200 s.IDVD's PLR values are roughly 15% lower than those of HILT-SI.
The small number of system members fetching the video content only consumes less bandwidth, so the PLR values of HILT-SI and IDVD show slow increase from  = 20s to  = 80 s.With sudden arrival of mass resource request, the high requirement of network bandwidth introduces the network congestion, so that HILT-SI and IDVD have high PLR from  = 100 s to  = 120 s.When the carriers constantly quit the system, the decreasing network traffic alleviates the congestion level.The PLR values of HILT-SI and IDVD fast decrease from  = 140 s to  = 200 s.In HILT-SI, the video data transmission relies on the logical link between carriers and INs; namely, the geographical distance of the communicating parties cannot be considered.The longdistance delivery of video data consumes the large number of bandwidth of relay nodes.Moreover, the more number of INs requires much network bandwidth.In IDVD, the carriers disseminate the message containing the information of video resources in neighbor geographical area.When the INs receive the resource information, they can download the video content from their neighbor carriers.The data only is forwarded by less relay nodes.Moreover, the small number of INs fetching video content cannot consume more network bandwidth.The congestion level of IDVD is lower than that of HILT-SI, so the PLR values of IDVD are less than those of HILT-SI.
Average Throughput.The total number of packets received in the overlay during a certain time period divided by the length of this time period is defined as the average throughput.
As Figure 7 shows, the average throughput curve of HILT-SI experiences severe fluctuation, which fast increases from  = 20 s to  = 80 s, immediately decreases from  = 80 s to  = 140 s, and finally has a fall after rise from  = 160 s to  = 200 s.The curve corresponding to IDVD results fast increases from  = 20 s to  = 100 s, reaches the peak value at  = 100 s, and slowly decreases from  = 120 s to  = 200 s.
The more number of INs introduces the transmission of much video streaming data in network.The throughput of HILT-SI fast increases from  = 20s to  = 80s.When the intensively arrival of mass resource request leads to the network congestion, the throughput of HILT-SI fast decreases due to the increase in PLR.With the increase in the number of carriers leaving the system, the decreasing congestion level enables the throughput rise.When the large number of carriers quits the system, the throughput fast falls.The more number of streaming and long-distance delivery result in high congestion level, so the throughput of HILT-SI severely jitters.In IDVD, the small number of data transmission requirement and the neighbor distance between nodes only introduce low-level congestion.When the congestion occurs at  = 100 s, the throughput of IDVD reaches the peak value.The congestion influence of IDVD is lighter than that of HILT-SI.

Conclusion
In this paper, we propose a novel interest detection-based video dissemination algorithm under flash crowd in mobile ad hoc networks (IDVD).IDVD prevents the degradation of QoS and network congestion caused by large-scale sudden request for popular video content.IDVD constructs an "H" model to build the categories of user request according to the popularities of video content and predict the amount demanded of upload bandwidth and period time of sudden request.The proposed resource dissemination algorithm formulates the area coverage of interested node discovery and resource dissemination and defines the convergence condition of spreading resources according to the epidemic model.The results show how IDVD obtains better performance than HILT-SI.

Notations
The Symbols Used in the Epidemic Model   : The total number of inquired nodes   : The number of nodes which store    IN : The total number of INs (IMNs and IMs)  um : The number of uninterested members : Theratioof  and   : Theratioof IN and   : Theratioof um and    0 : The initial value of   0 : The initial value of  : Thespreadingrate : Therecoveryrate.

Figure 2 :Figure 3 :
Figure 2: The number of discovered INs against simulation time.
is the number of request bandwidth values in   during   .is considered as the original series () cessed to an accumulated series ()  = ( ()  1 ,  ()  2 , . . .,  ()   ), according to Therefore, the value of  is set to 1.We use a differential equation to denote the SIR model as follows: IN  denotes the number of INs discovered by   . is defined as  =  IM /  where  IM is the number of discovered IMs.The members which have watched   are usually uninterested to view   again; namely, their state becomes uninterested.

Table 1 :
Simulation parameter setting for MANET.Capacity of IN Discovery and ContentSpreading.The number of discovered INs (the interested members and mobile nodes) and carriers (the nodes carry   ) denotes the capacities of content dissemination for two solutions.
50 mobile nodes are interested in   .The INs cache and play   after they are discovered (influenced).The members which have watched   quit the system and remove   from local buffer.The uninterested nodes do not cache   during the whole simulation time.In HILT-SI, each IN is independently assigned a random infected threshold , 0 <  < 1 and the values of Γ and  are set to 0.9 and 0.3, respectively.