SlideShare a Scribd company logo
1 of 4
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 09-12
www.iosrjournals.org
DOI: 10.9790/0661-17130912 www.iosrjournals.org 9 | Page
A Survey on Balancing the Network Load Using Geographic
Hash Tables
Patil Prajakta1
, Prof. Vinod Wadne 2
1,2
Department of Computer Engineering, JSPM’s Imperial College of Engineering& Research, Wagholi, Pune,
Savitribai Phule Pune University , India.
Abstract: The load Balancing in the network is a severe problem in network. The data created in wireless
network is kept on node. It accessed over geographic hash table. The geographic hash table is used to recover
data from the nodes. The preceding approaches permit the balancing load by varying georouting protocol [1].
In our work, it is prove that it’s probable to balancing the network load in geographic hash table. It can happen
without any change of underlying georouting protocols. As a replacement of changing the straight line in
georouting protocols, it can used to direct query after ode delivering query to the node handling queried key at
the destination. It proposes to the hash functions are used to stock data in network, applying sort of load-aware
task of the keys to the nodes. This new method is instantiated in to two exact approaches: analytical, which is
target density function getting load balancing is characterized below uniformity conventions for concerns site of
the nodes and sources; and an iterative, heuristic method that could be recycled when these consistency rules
are not satisfied. It attempts to stop many request sent to single node. Here we are going to use hash algorithm
for the security purpose.
Keywords: Georouting protocols, analytical, georouting protocol, heuristic, and Load balancing.
I. Introduction
The load balancing of resources is most important in the network. The memory of nodes is restricted. If
the imbalance is happened in the network it has negative influence on the network. Since transmission and
reception operations are not consistently spread amongst network. To extend the life of a network we are going
to use load balancing in the GHTs. Geographic Hash Table [7] has used to get and stock data from the nodes.
Respectively node is get assigned value of the certain ranges. For Example: 2D real interval [0, 1]. Respectively
data is added with the metadata. The metadata is getting hashed to key values. The Keys are getting stored in
nodes.
Fig. 1: GHT Data Retrieval
As presented in the Figure [1], Geographic Hash Table is maintaining in all the data about the nodes.
Geographic Hash Table is approach for the effectively recovering data from the network. The network is
collected by the large number of small powers, small cost nodes which is self-organizes into multi hop ad hoc
network. The data is collected by outside node when connected to networks. Node could either static or
movable. It is retrieved by outside operator and recovers data collected by the networks. The network stable in
size, it does amount of data which should process. It collected by network. In efforts to deliver accomplished
entrance to data and stand disturbances between networks and nodes [3], it proposed Geographic Hash Tables
(GHT). GHT measures hash functions to map the data to geographic positions trying to allocate data
A Survey on Balancing the Network Load Using Geographic Hash Table
DOI: 10.9790/0661-17130912 www.iosrjournals.org 10 | Page
consistently across networks. GHT hashes name of the data to store a location s in field. The boundary mode of
GPSR [2] is used to select the closest sensor to s, which becomes the home node for the data. GHT stores a copy
of data in node as well in nodes belonging perimeter. Keeping on perimeter is crucial to assurance data
persistency.
II. Related Work
2.1 Georouting
Georouting is also known as geographic routings or position based routings. In the georouting instead
of the particular destination, message routed toward a specific geographic location and it is delivered to the node
whose key is closest to destination [4]. The load imbalance is reduced when modification of the georouting
protocol. Varying georouting protocols come at price. It might be impact on the upper layer and the existing
application.
2.2 Load Balancing in the Networks
The Load balancing splits incoming transaction to the all servers. It may send transactions to the next
server. Load balancing services usually delivered by the devoted software and hardware.
3.3 Dynamic Geographic Hash Table
The problems caused due to static GHT, the proposal of Dynamic GHT solutions, which used
sequential attribute of the queries. The data is in addition to occasion type to choose hashed positions for events.
Set of hashed positions changes over the time to get ensured that nodes are contributing justly to network
processes. Also, DGHT evades hashing actions into resonating regions by occasionally informing network data
[5]. DGHT trusts on schemes such as: a temporal based geographic hash table and a location selection scheme
depends on node contribution.
A Survey on Balancing the Network Load Using Geographic Hash Table
DOI: 10.9790/0661-17130912 www.iosrjournals.org 11 | Page
III. Model Of A Network
Source Node[s]:
The source node initiates query for the key k.
Destination Node[d]: The destination node d responsible for the key called k. In routing protocols such
as GPSR the packets may encounter end. The packets are then distracted till path to target gets available .They
don’t consider path distance when the routing around the local obstacles such that packets move from the source
to the destination.
Probability density function:
Source density s(x, y), is denoting probability densities of having source s of the query located at the
(x, y). Destination density d(x, y) is denoting probability density of having destination d of the query located at
the (x, y).
IV. Design Of Hash Function
4.1 Hash functions
The hash function algorithms or subroutines map large amount of data arrangements of the variable
length to the small data sets of the fixed lengths. Hash function is shown in the figure [2].
Fig. 2
In the particulars, we are going to specify the hash functions can calculated in the distributed and
localized approach, so according to the typical network designs and guidelines.
4.2 Hash tables
The hash function is primarily used in the hash table. It locates data record fast (e.g. dictionary
definition) which is given the search keys or the headword.
V. Modules
5.1 Analytical Approach
It is decided that number of servers are going to be used. Nodes are connected to it. It is considered
that nodes and servers are created. This approach adds new node to server in following conditions.
1. The amount of data goes beyond the allowable boundary in each node.
2. Creation of a new node.
A Survey on Balancing the Network Load Using Geographic Hash Table
DOI: 10.9790/0661-17130912 www.iosrjournals.org 12 | Page
5.2 Heuristic Approach
These approach efforts to stop several requests being directed to node. It does by moving information
from extremely loaded node to other nodes having smaller load. This approach is founded on consistency
conventions for what concerns nodes and source densities. Such assumptions aren’t met, we proposed to usage
dissimilar load balancing approaches, based on heuristic that recurrently fluctuations key range allocated to
nodes load balancing is enhanced. Request for the data from source, data would be analyzed through geographic
hash table (GHT) which map demanded information through its related key values [6]. These key values are
actually stored in the geographic hash table (GHT). Hence mapping would be made to the node, which
requested data could be retrieved.
VI. Conclusion
In our proposed work, we presented different way of upcoming load balancing problems in GHT
designs. The proposed method has instantiated into analytical and the heuristic methods. It has shown that it
provides good load balancing to deal with the conditions. To provide the load balancing enhancements compare
or even greater to those providing by the existing chimes in applied scenario, even consistency assumption do
not valid. The main advantage of presented load balancing method in existing systems lies in practicality.
Promising extension of ideas to the other field like mobility and security has been discussed. The future
enhancement will plan to detect possible approach of covering and incorporating the approach with the present
idea.
References
[1]. M. Elena Renda, Giovanni Resta, and Paolo Santi Load Balancing Hashing in Geographic Hash Tables, VOL. 23, NO. 8,
AUGUST 2012
[2]. P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Wireless
Networks, vol. 7, no. 6, pp. 609-616, 2001.
[3]. C. Canali, M.E. Renda, and P. Santi, “Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh
Networks,” Proc. IEEE MeshTech, pp. 603-609, 2008.
[4]. D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, Kluwer Academic
Publishers, pp. 153-181, 1996.
[5]. A. Mei and J. Stefa, “Routing in Outer Space: Fair Traffic Load in Multi-hop Wireless Networks,” Proc. ACM MobiHoc, pp. 23-31,
2008.
[6]. L. Popa, A. Rostamizadeh, R.M. Karp, C. Papadimitriou, and Stoica, “Balancing Traffic Load in Wireless Networks witCurveball
Routing,” Proc. ACM MobiHoc, pp. 170-179, 2007.
[7]. S.Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin,and F. Yu, “Data-Centric Storage in Sensornets with GHT, a
Geographic Hash Table,” Mobile Networks and Appl., vol. 8, no. 4, pp. 427-442, 2003.

More Related Content

What's hot

The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks IJECEIAES
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...TELKOMNIKA JOURNAL
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...1crore projects
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTIJCNCJournal
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsIAEME Publication
 
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
T AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDST AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDS
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDSijcsit
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSijcsit
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IJCNCJournal
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsijdms
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...IJCNCJournal
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...ijasuc
 
Analysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputAnalysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputIJCNCJournal
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 

What's hot (18)

The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks Operating Task Redistribution in Hyperconverged Networks
Operating Task Redistribution in Hyperconverged Networks
 
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...Clustering and data aggregation scheme in underwater wireless acoustic sensor...
Clustering and data aggregation scheme in underwater wireless acoustic sensor...
 
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading i...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENTDYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
DYNAMIC TASK SCHEDULING BASED ON BURST TIME REQUIREMENT FOR CLOUD ENVIRONMENT
 
A location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applicationsA location based least-cost scheduling for data-intensive applications
A location based least-cost scheduling for data-intensive applications
 
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
T AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDST AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDS
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
 
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKSGREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
GREEDY CLUSTER BASED ROUTING FOR WIRELESS SENSOR NETWORKS
 
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
IMPROVEMENTS IN ROUTING ALGORITHMS TO ENHANCE LIFETIME OF WIRELESS SENSOR NET...
 
Efficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streamsEfficient processing of spatial range queries on wireless broadcast streams
Efficient processing of spatial range queries on wireless broadcast streams
 
50120130406035
5012013040603550120130406035
50120130406035
 
Aps 10june2020
Aps 10june2020Aps 10june2020
Aps 10june2020
 
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
SECTOR TREE-BASED CLUSTERING FOR ENERGY EFFICIENT ROUTING PROTOCOL IN HETEROG...
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Analysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User ThroughputAnalysis of LTE Radio Load and User Throughput
Analysis of LTE Radio Load and User Throughput
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 

Viewers also liked (20)

A010320106
A010320106A010320106
A010320106
 
C1103041623
C1103041623C1103041623
C1103041623
 
T180203125133
T180203125133T180203125133
T180203125133
 
F017633538
F017633538F017633538
F017633538
 
B0730406
B0730406B0730406
B0730406
 
I1304026367
I1304026367I1304026367
I1304026367
 
B010410411
B010410411B010410411
B010410411
 
H0213337
H0213337H0213337
H0213337
 
H010136066
H010136066H010136066
H010136066
 
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
Power-Quality-Improvement-Using-PI-and-Fuzzy-Logic-Controllers-Based-Shunt-Ac...
 
A017240107
A017240107A017240107
A017240107
 
F1802043747
F1802043747F1802043747
F1802043747
 
E017233034
E017233034E017233034
E017233034
 
J1803036367
J1803036367J1803036367
J1803036367
 
H1802025259
H1802025259H1802025259
H1802025259
 
A017230107
A017230107A017230107
A017230107
 
F010433136
F010433136F010433136
F010433136
 
H017514655
H017514655H017514655
H017514655
 
L012337275
L012337275L012337275
L012337275
 
L1303077783
L1303077783L1303077783
L1303077783
 

Similar to A Survey on Balancing Network Load Using Geographic Hash Tables

A method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pA method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pIAEME Publication
 
A method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pA method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pIAEME Publication
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...ijcsit
 
Simple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudSimple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudIOSR Journals
 
SSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsSSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsINFOGAIN PUBLICATION
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksijasuc
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingijitjournal
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...IJCI JOURNAL
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloudiosrjce
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd Iaetsd
 
B03202006011
B03202006011B03202006011
B03202006011theijes
 
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...inventionjournals
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmIOSR Journals
 

Similar to A Survey on Balancing Network Load Using Geographic Hash Tables (20)

A method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pA method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 p
 
A method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 pA method for balancing heterogeneous request load in dht based p2 p
A method for balancing heterogeneous request load in dht based p2 p
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
AN ENTROPIC OPTIMIZATION TECHNIQUE IN HETEROGENEOUS GRID COMPUTING USING BION...
 
Simple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In CloudSimple Load Rebalancing For Distributed Hash Tables In Cloud
Simple Load Rebalancing For Distributed Hash Tables In Cloud
 
SSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETsSSI Routing Scheme for Heterogeneous MANETs
SSI Routing Scheme for Heterogeneous MANETs
 
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networksShortest path algorithm for data transmission in wireless ad hoc sensor networks
Shortest path algorithm for data transmission in wireless ad hoc sensor networks
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 
Improving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routingImproving the scalability by contact information compression in routing
Improving the scalability by contact information compression in routing
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...
Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
C017371624
C017371624C017371624
C017371624
 
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with CloudEfficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
Efficient IOT Based Sensor Data Analysis in Wireless Sensor Networks with Cloud
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Iaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection inIaetsd a survey on geographic routing relay selection in
Iaetsd a survey on geographic routing relay selection in
 
B03202006011
B03202006011B03202006011
B03202006011
 
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
Power Aware Geocast Based Geocast Region Tracking Using Mobile Node in Wirele...
 
Distributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV AlgorithmDistributed Path Computation Using DIV Algorithm
Distributed Path Computation Using DIV Algorithm
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

A Survey on Balancing Network Load Using Geographic Hash Tables

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 09-12 www.iosrjournals.org DOI: 10.9790/0661-17130912 www.iosrjournals.org 9 | Page A Survey on Balancing the Network Load Using Geographic Hash Tables Patil Prajakta1 , Prof. Vinod Wadne 2 1,2 Department of Computer Engineering, JSPM’s Imperial College of Engineering& Research, Wagholi, Pune, Savitribai Phule Pune University , India. Abstract: The load Balancing in the network is a severe problem in network. The data created in wireless network is kept on node. It accessed over geographic hash table. The geographic hash table is used to recover data from the nodes. The preceding approaches permit the balancing load by varying georouting protocol [1]. In our work, it is prove that it’s probable to balancing the network load in geographic hash table. It can happen without any change of underlying georouting protocols. As a replacement of changing the straight line in georouting protocols, it can used to direct query after ode delivering query to the node handling queried key at the destination. It proposes to the hash functions are used to stock data in network, applying sort of load-aware task of the keys to the nodes. This new method is instantiated in to two exact approaches: analytical, which is target density function getting load balancing is characterized below uniformity conventions for concerns site of the nodes and sources; and an iterative, heuristic method that could be recycled when these consistency rules are not satisfied. It attempts to stop many request sent to single node. Here we are going to use hash algorithm for the security purpose. Keywords: Georouting protocols, analytical, georouting protocol, heuristic, and Load balancing. I. Introduction The load balancing of resources is most important in the network. The memory of nodes is restricted. If the imbalance is happened in the network it has negative influence on the network. Since transmission and reception operations are not consistently spread amongst network. To extend the life of a network we are going to use load balancing in the GHTs. Geographic Hash Table [7] has used to get and stock data from the nodes. Respectively node is get assigned value of the certain ranges. For Example: 2D real interval [0, 1]. Respectively data is added with the metadata. The metadata is getting hashed to key values. The Keys are getting stored in nodes. Fig. 1: GHT Data Retrieval As presented in the Figure [1], Geographic Hash Table is maintaining in all the data about the nodes. Geographic Hash Table is approach for the effectively recovering data from the network. The network is collected by the large number of small powers, small cost nodes which is self-organizes into multi hop ad hoc network. The data is collected by outside node when connected to networks. Node could either static or movable. It is retrieved by outside operator and recovers data collected by the networks. The network stable in size, it does amount of data which should process. It collected by network. In efforts to deliver accomplished entrance to data and stand disturbances between networks and nodes [3], it proposed Geographic Hash Tables (GHT). GHT measures hash functions to map the data to geographic positions trying to allocate data
  • 2. A Survey on Balancing the Network Load Using Geographic Hash Table DOI: 10.9790/0661-17130912 www.iosrjournals.org 10 | Page consistently across networks. GHT hashes name of the data to store a location s in field. The boundary mode of GPSR [2] is used to select the closest sensor to s, which becomes the home node for the data. GHT stores a copy of data in node as well in nodes belonging perimeter. Keeping on perimeter is crucial to assurance data persistency. II. Related Work 2.1 Georouting Georouting is also known as geographic routings or position based routings. In the georouting instead of the particular destination, message routed toward a specific geographic location and it is delivered to the node whose key is closest to destination [4]. The load imbalance is reduced when modification of the georouting protocol. Varying georouting protocols come at price. It might be impact on the upper layer and the existing application. 2.2 Load Balancing in the Networks The Load balancing splits incoming transaction to the all servers. It may send transactions to the next server. Load balancing services usually delivered by the devoted software and hardware. 3.3 Dynamic Geographic Hash Table The problems caused due to static GHT, the proposal of Dynamic GHT solutions, which used sequential attribute of the queries. The data is in addition to occasion type to choose hashed positions for events. Set of hashed positions changes over the time to get ensured that nodes are contributing justly to network processes. Also, DGHT evades hashing actions into resonating regions by occasionally informing network data [5]. DGHT trusts on schemes such as: a temporal based geographic hash table and a location selection scheme depends on node contribution.
  • 3. A Survey on Balancing the Network Load Using Geographic Hash Table DOI: 10.9790/0661-17130912 www.iosrjournals.org 11 | Page III. Model Of A Network Source Node[s]: The source node initiates query for the key k. Destination Node[d]: The destination node d responsible for the key called k. In routing protocols such as GPSR the packets may encounter end. The packets are then distracted till path to target gets available .They don’t consider path distance when the routing around the local obstacles such that packets move from the source to the destination. Probability density function: Source density s(x, y), is denoting probability densities of having source s of the query located at the (x, y). Destination density d(x, y) is denoting probability density of having destination d of the query located at the (x, y). IV. Design Of Hash Function 4.1 Hash functions The hash function algorithms or subroutines map large amount of data arrangements of the variable length to the small data sets of the fixed lengths. Hash function is shown in the figure [2]. Fig. 2 In the particulars, we are going to specify the hash functions can calculated in the distributed and localized approach, so according to the typical network designs and guidelines. 4.2 Hash tables The hash function is primarily used in the hash table. It locates data record fast (e.g. dictionary definition) which is given the search keys or the headword. V. Modules 5.1 Analytical Approach It is decided that number of servers are going to be used. Nodes are connected to it. It is considered that nodes and servers are created. This approach adds new node to server in following conditions. 1. The amount of data goes beyond the allowable boundary in each node. 2. Creation of a new node.
  • 4. A Survey on Balancing the Network Load Using Geographic Hash Table DOI: 10.9790/0661-17130912 www.iosrjournals.org 12 | Page 5.2 Heuristic Approach These approach efforts to stop several requests being directed to node. It does by moving information from extremely loaded node to other nodes having smaller load. This approach is founded on consistency conventions for what concerns nodes and source densities. Such assumptions aren’t met, we proposed to usage dissimilar load balancing approaches, based on heuristic that recurrently fluctuations key range allocated to nodes load balancing is enhanced. Request for the data from source, data would be analyzed through geographic hash table (GHT) which map demanded information through its related key values [6]. These key values are actually stored in the geographic hash table (GHT). Hence mapping would be made to the node, which requested data could be retrieved. VI. Conclusion In our proposed work, we presented different way of upcoming load balancing problems in GHT designs. The proposed method has instantiated into analytical and the heuristic methods. It has shown that it provides good load balancing to deal with the conditions. To provide the load balancing enhancements compare or even greater to those providing by the existing chimes in applied scenario, even consistency assumption do not valid. The main advantage of presented load balancing method in existing systems lies in practicality. Promising extension of ideas to the other field like mobility and security has been discussed. The future enhancement will plan to detect possible approach of covering and incorporating the approach with the present idea. References [1]. M. Elena Renda, Giovanni Resta, and Paolo Santi Load Balancing Hashing in Geographic Hash Tables, VOL. 23, NO. 8, AUGUST 2012 [2]. P. Bose, P. Morin, I. Stojmenovic, and J. Urrutia, “Routing with Guaranteed Delivery in Ad Hoc Wireless Networks,” Wireless Networks, vol. 7, no. 6, pp. 609-616, 2001. [3]. C. Canali, M.E. Renda, and P. Santi, “Evaluating Load Balancing in Peer-to-Peer Resource Sharing Algorithms for Wireless Mesh Networks,” Proc. IEEE MeshTech, pp. 603-609, 2008. [4]. D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, Kluwer Academic Publishers, pp. 153-181, 1996. [5]. A. Mei and J. Stefa, “Routing in Outer Space: Fair Traffic Load in Multi-hop Wireless Networks,” Proc. ACM MobiHoc, pp. 23-31, 2008. [6]. L. Popa, A. Rostamizadeh, R.M. Karp, C. Papadimitriou, and Stoica, “Balancing Traffic Load in Wireless Networks witCurveball Routing,” Proc. ACM MobiHoc, pp. 170-179, 2007. [7]. S.Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin,and F. Yu, “Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table,” Mobile Networks and Appl., vol. 8, no. 4, pp. 427-442, 2003.