SlideShare a Scribd company logo
1 of 4
Download to read offline
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 215
Paper Publications
Scheduling Mechanism in Wireless Networks
Deepa .C. G
M P Nachimuthu M Jaganathan Engineering College, Chennimalai, Erode, India
Abstract: The rapid growth of wireless content access implies the need for content placement and scheduling at
wireless base stations. Here study a system under which users are divided into clusters based on their channel
conditions, and their requests are represented by different queues at logical front ends. Requests might be elastic
(implying no hard delay constraint) or inelastic (requiring that a delay target be met). Correspondingly, we have
request queues that indicate the number of elastic requests, and deficit queues that indicate the deficit in inelastic
service. In this project, content caching and scheduling are monitored. The user will send request to the server
when the base station doesn’t have that file. The user who receives the file will become the base station for that file.
To reduce memory consumption, when other user request the same file the base station send s that file delete it.
The receiving user will become the base station for that file.
Keywords: rapid growth of wireless content access implies placement and scheduling at wireless base stations.
I. INTRODUCTION
The rapid growth of wireless content access implies the need for content placement and scheduling at wireless base
stations. Content might include streaming applications in which chunks of the file must be received under hard delay
constraints, as well as file downloads such as software updates that do not have such hard constraints. The core of the
Internet is well provisioned, and network capacity constraints for content delivery are at the media vault and at the
wireless access links at end-users. Hence, a natural location to place caches for a content distribution network (CDN)
would be at the wireless gateway, which could be a cellular base station through which users obtain network access.
Furthermore, it is natural to try to take advantage of the inherent broadcast nature of the wireless medium to satisfy
multiple users simultaneously.
In the existing system, there are multiple cellular base stations (BSs), each of which has a cache in which to store content.
The content of the caches can be periodically refreshed through accessing a media vault. The following constraints affect
system operation: 1) the wireless network between the caches to the users has finite capacity; 2) each cache can only host
a finite amount of content; and 3) refreshing content in the caches from the media vault incurs a cost.
II. LITERATURE REVIEW
2.1 User request:
Users can make two kinds of requests, namely: 1) elastic requests that have no delay constraints, and 2) inelastic requests
that have a hard delay constraint. Elastic requests are stored in a request queue at each front end, with each type of request
occupying a particular queue. Here, the objective is to stabilize the queue, so as to have finite delays. For inelastic
requests, Here adopt the model users request chunks of content that have a strict deadline, and the request is dropped if the
deadline cannot be met. The idea here is to meet a certain target delivery ratio .Each time an inelastic request is dropped, a
deficit queue is updated by an amount proportional to the delivery ratio. I would like the average value of the deficit to be
zero.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 216
Paper Publications
2.2 Clusters:
Here divide users into different clusters, with the idea that all users in each cluster are geographically close such that they
have statistically similar channel conditions and are able to access the same base stations. The requests made by each
cluster are aggregated at a logical entity that we call a front end (FE) associated with that cluster. The front end could be
running on any of the devices in the cluster or at a base station, and its purpose is to keep track of the requests associated
with the users of that cluster.
2.3 Queues:
Elastic requests are stored in a request queue at each front end, with each type of request occupying a particular queue.
Here, the objective is to stabilize the queue, so as to have finite delays. For inelastic requests, we adopt the model
proposed in wherein users request chunks of content that have a strict deadline, and the request is dropped if the deadline
cannot be met. Each time an inelastic request is dropped, a deficit queue is updated by an amount proportional to the
delivery ratio.
III. SYSTEM MODEL
There are multiple cellular base stations (BSs), each of which has a cache in which to store content. The content of the
caches can be periodically refreshed through accessing a media vault. We divide users into different clusters, with the idea
that all users in each cluster are geographically close such that they have statistically similar channel conditions and are
able to access the same base stations.
The requests made by each cluster are aggregated at a logical entity that we call a front end (FE) associated with that
cluster. The front end could be running on any of the devices in the cluster or at a base station, and its purpose is to keep
track of the requests associated with the users of that cluster.
MEDIA VAULT
Cache1 Cache 2 Cache n
BS 1 BS 2 BS m
Wireless Broad cast
FE 1 FE 2 FE n
System Architecture
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 217
Paper Publications
There is a set of base stations M and each base station is associated with a cache. The caches are all connected to a media
vault that contains all the content. The users in the system are divided into clusters based on their geographical positions,
and let N denote the set of these clusters. There are front ends in each cluster, also denoted by n € N whose purpose is to
aggregate requests from the users. Time is slotted, and we divide time into frames consisting of D time-slots. Requests are
made at the beginning of each frame. There are two types of users in this system—inelastic and elastic—based on the type
of requests that they make. Requests made by inelastic users must be satisfied within the frame in which they were made.
Elastic users do not have such a fixed deadline, and these users arrive, make a request, are served, and depart.
The base stations employ multiple access schemes, and hence each base station can support multiple simultaneous unicast
transmissions, as well as a single broadcast transmission. It is also possible to study other scenarios using our framework.
Assume that all pieces of content have the same size, and we call the unit of storage and transmission as a chunk. When a
channel is ON, it can be used to transmit at most one chunk (per slot).Content is partitioned into two disjoint sets of
inelastic content and elastic content.
3.1unicast communications:
Requests are to be served using unicast communications. For notational convenience, we assume that transmissions are
between base stations and frontends, rather than to the actual users making the requests. First determine the capacity
region, which is the set of all feasible requests .Note that this model, in which front ends have independent and distinct
channels to the caches, differs from the previously studied wired caching systems because the wireless channels are not
always ON. Therefore, the placement and scheduling must be properly coordinated according to the channel states.
3.2 Content expiry:
In this section, we study an inelastic caching problem where the contents expire after some time. In this new model, which
is compatible with real-time streaming of live events, we only consider inelastic traffic and assume that the lifetime of an
inelastic content is equal to the length of a frame. Hence, we can cache a content only for the duration of a frame after
which the scontent will not be useful any longer.
IV. DISCUSSION
4.1 memory consumption:
In the existing project, same contents will be stored in the multiple base stations. User request for the content which is
already stored in the multiple base stations. In this case the user will get confused in forwarding the request. The user will
get collapsed and send request to multiple base stations. To overcome this problem scheduling part is concentrated mainly
in this project.
In the content caching and scheduling instead of having multiple base stations for the same content, one base station will
have the content. To achieve this kind of scheduling type, when users make the request for the content stored in the base
station the base station send the content and it delete the requested content automatically. The user who receives the
content becomes the base station for that specific content. In this way the scheduling will take part and the multiple base
stations for the same content will be avoided.
V. CONCLUSION
In the content caching and scheduling instead of having multiple base stations for the same content, one base station will
have the content. Multiple base stations will be available but duplicated contents will be restricted. Same contents will not
be stored in multiple base stations. Memory consumption will be low in the base stations. It stabilizes the system load
within the capacity region. Also minimizes the average expected cost while stabilizing the deflect queues.
ACKNOWLEDGEMENT
I would like to thank Mr. K.N Sivakumar, HOD, Department of Computer Science and Engineering and my guide Ms. P.
Shenmbagavalli, Assistant Professor, Department of Computer Science and Engineering for their wonderful support
throughout this project.
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 218
Paper Publications
REFERENCES
[1] Throughput-Optimal Wireless Scheduling with Regulated Inter-Service Times Ruogu Li, Bin Li, and Atilla
Eryilmaz.
[2] K. Psounis and B. Prabhakar, ―Efficient randomized Web-cache schemes using samples from past eviction times,‖
ACM Trans. Netw., vol. 10, no. 4, pp. 441–455, Aug. 2002.
[3] L. Tassiulas and A. Ephremides, ―Stability properties of constrained queueing systems and scheduling policies for
maximum throughput in multihop radio networks,‖ IEEE Trans. Autom. Control, vol. 37, no. 12, pp. 1936–1948,
Dec. 1992.
[4] L. Tassiulas and A. Ephremides, ―Stability properties of constrained queueing systems and scheduling policies for
maximum throughput in multihop radio networks,‖ IEEE Trans. Autom. Control, vol. 37, no. 12, pp. 1936–1948,
Dec. 1992.
[5] A. Stolyar, ―Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm,‖ Queueing
Syst. Theory Appl., vol. 50, no. 4, pp. 401–457, 2005
[6] M. M. Amble, P. Parag, S. Shakkottai, and L. Ying, ―Content-aware caching and traffic management in content
distribution networks,‖ in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 2858–2866.
[7] N. Abedini and S. Shakkottai, ―Content caching and scheduling in wireless broadcast networks with elastic and
inelastic traffic,‖ in Proc. IEEE WiOpt, 2011, pp. 125–132.
[8] I. Hou, V. Borkar, and P. Kumar, ―A theory of QoS for wireless,‖ inProc. IEEE INFOCOM, Rio de Janeiro, Brazil,
Apr. 2009, pp. 486–494.
[9] R. M. P. Raghavan, Randomized Algorithms. NewYork, NY,USA: Cambridge Univ. Press, 1995.
[10] P. Cao and S. Irani, ―Cost-awareWWWproxy caching algorithms,‖ in Proc. USENIX Symp. Internet Technol. Syst.,
Berkeley, CA, Dec. 1997, p. 18.
[11] N. Laoutaris, O.T. Orestis, V.Zissimopoulos, and I. Stavrakakis, ―Distributed selfish replication,‖ IEEE Trans.
Parallel Distrib. Syst., vol. 17, no. 12, pp. 1401–1413, Dec. 2006.
Author’s Profile:
Deepa C G is currently pursuing Masters Degree Program in computer science and engineering in MP Nachimuthu M
Jaganathan Engineering college, Erode- Anna university India, PH:04294250242
Email: deepa120488@gmail.com

More Related Content

What's hot

Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Sharif Hossen
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparisonPhearin Sok
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 
Project
Project Project
Project J M
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...1crore projects
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSIJCNCJournal
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocolijtsrd
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksCSCJournals
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant NetworksAnubhav Mahajan
 
Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Videoguy
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classificationShivi Shukla
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - JournalLaili Aidi
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisNagendra Posani
 

What's hot (19)

Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
Performance analysis of Delay-Tolerant Routing Protocols in Intermittently Co...
 
Routing protocol for delay tolerant network a survey and comparison
Routing protocol for delay tolerant network   a survey and comparisonRouting protocol for delay tolerant network   a survey and comparison
Routing protocol for delay tolerant network a survey and comparison
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 
Project
Project Project
Project
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Repl...
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
Classroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast ProtocolClassroom Shared Whiteboard System using Multicast Protocol
Classroom Shared Whiteboard System using Multicast Protocol
 
D0431013019
D0431013019D0431013019
D0431013019
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Replica Placement In Unstable Radio Links
Replica Placement In Unstable Radio LinksReplica Placement In Unstable Radio Links
Replica Placement In Unstable Radio Links
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Routing in Delay Tolerant Networks
Routing in Delay Tolerant NetworksRouting in Delay Tolerant Networks
Routing in Delay Tolerant Networks
 
Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...Cooperative Architectures and Algorithms for Discovery and ...
Cooperative Architectures and Algorithms for Discovery and ...
 
Intro to DTN and routing classification
Intro to DTN and routing classificationIntro to DTN and routing classification
Intro to DTN and routing classification
 
Delay Tolerant Network - Journal
Delay Tolerant Network - JournalDelay Tolerant Network - Journal
Delay Tolerant Network - Journal
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance AnalysisMulticasting in Delay Tolerant Networks: Implementation and Performance Analysis
Multicasting in Delay Tolerant Networks: Implementation and Performance Analysis
 

Viewers also liked

Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithmpaperpublications3
 
An Algorithm Analysis on Data Mining
An Algorithm Analysis on Data MiningAn Algorithm Analysis on Data Mining
An Algorithm Analysis on Data Miningpaperpublications3
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNpaperpublications3
 
An Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search TechniqueAn Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search Techniquepaperpublications3
 
Analysis of Classification Approaches
Analysis of Classification ApproachesAnalysis of Classification Approaches
Analysis of Classification Approachespaperpublications3
 
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)paperpublications3
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETpaperpublications3
 
A Task Scheduling Algorithm in Cloud Computing
A Task Scheduling Algorithm in Cloud ComputingA Task Scheduling Algorithm in Cloud Computing
A Task Scheduling Algorithm in Cloud Computingpaperpublications3
 
Energy_Use_Patterns_and_Energy_Efficienc
Energy_Use_Patterns_and_Energy_EfficiencEnergy_Use_Patterns_and_Energy_Efficienc
Energy_Use_Patterns_and_Energy_EfficiencNaod Mekonnen
 
ASM PUNE NITOTEC PAPER - FINAL VERSION
ASM PUNE NITOTEC PAPER - FINAL VERSIONASM PUNE NITOTEC PAPER - FINAL VERSION
ASM PUNE NITOTEC PAPER - FINAL VERSIONPratap Ghorpade
 
Comunitats d 'aprenentatge
Comunitats d 'aprenentatge Comunitats d 'aprenentatge
Comunitats d 'aprenentatge apares23
 
15 presentation final
15 presentation final15 presentation final
15 presentation final101k_
 
Анонсы Integrated Systems Europe 2017
Анонсы Integrated Systems Europe 2017Анонсы Integrated Systems Europe 2017
Анонсы Integrated Systems Europe 2017OksanaZa
 

Viewers also liked (17)

Comparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting AlgorithmComparative Performance Analysis & Complexity of Different Sorting Algorithm
Comparative Performance Analysis & Complexity of Different Sorting Algorithm
 
An Algorithm Analysis on Data Mining
An Algorithm Analysis on Data MiningAn Algorithm Analysis on Data Mining
An Algorithm Analysis on Data Mining
 
Delay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSNDelay Constrained Energy Efficient Data Transmission over WSN
Delay Constrained Energy Efficient Data Transmission over WSN
 
An Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search TechniqueAn Advanced IR System of Relational Keyword Search Technique
An Advanced IR System of Relational Keyword Search Technique
 
Analysis of Classification Approaches
Analysis of Classification ApproachesAnalysis of Classification Approaches
Analysis of Classification Approaches
 
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
A SURVEY AND COMPARETIVE ANALYSIS OF E-LEARNING PLATFORM (MOODLE AND BLACKBOARD)
 
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELETEntropy based Digital Watermarking using 2-D Biorthogonal WAVELET
Entropy based Digital Watermarking using 2-D Biorthogonal WAVELET
 
A Task Scheduling Algorithm in Cloud Computing
A Task Scheduling Algorithm in Cloud ComputingA Task Scheduling Algorithm in Cloud Computing
A Task Scheduling Algorithm in Cloud Computing
 
Sharath_CV
Sharath_CVSharath_CV
Sharath_CV
 
Energy_Use_Patterns_and_Energy_Efficienc
Energy_Use_Patterns_and_Energy_EfficiencEnergy_Use_Patterns_and_Energy_Efficienc
Energy_Use_Patterns_and_Energy_Efficienc
 
Pennywise cleaners sheffield
Pennywise cleaners sheffieldPennywise cleaners sheffield
Pennywise cleaners sheffield
 
madhavan
madhavanmadhavan
madhavan
 
ASM PUNE NITOTEC PAPER - FINAL VERSION
ASM PUNE NITOTEC PAPER - FINAL VERSIONASM PUNE NITOTEC PAPER - FINAL VERSION
ASM PUNE NITOTEC PAPER - FINAL VERSION
 
Comunitats d 'aprenentatge
Comunitats d 'aprenentatge Comunitats d 'aprenentatge
Comunitats d 'aprenentatge
 
15 presentation final
15 presentation final15 presentation final
15 presentation final
 
GAURAV_BHAWSAR
GAURAV_BHAWSARGAURAV_BHAWSAR
GAURAV_BHAWSAR
 
Анонсы Integrated Systems Europe 2017
Анонсы Integrated Systems Europe 2017Анонсы Integrated Systems Europe 2017
Анонсы Integrated Systems Europe 2017
 

Similar to Scheduling Mechanism in Wireless Networks

2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...IEEEFINALSEMSTUDENTSPROJECTS
 
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...chennaijp
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...swathi78
 
Iaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd Iaetsd
 
Efficient Cloud Caching
Efficient Cloud CachingEfficient Cloud Caching
Efficient Cloud CachingIJERA Editor
 
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...CSCJournals
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS cscpconf
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...IJCSIS Research Publications
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445IJRAT
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery inambitlick
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD SolutionsInfosys
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network IJECEIAES
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...ijassn
 
Project synopsis
Project synopsisProject synopsis
Project synopsisgirija12345
 
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK cscpconf
 

Similar to Scheduling Mechanism in Wireless Networks (20)

2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...
 
Cc
CcCc
Cc
 
Iaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cache
 
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
IMPLIMENTATION ON DISTRIBUTED COOPERATIVE CACHING IN SOCIAL WIRELESS NETWORK ...
 
Efficient Cloud Caching
Efficient Cloud CachingEfficient Cloud Caching
Efficient Cloud Caching
 
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...
Dynamic Hybrid Topology Design for Integrated Traffic Support in WDM Mesh Net...
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
An Enhanced Approach of Clustering Protocol to Minimize Energy Holes in Wirel...
 
Bc044335338
Bc044335338Bc044335338
Bc044335338
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Adaptive location oriented content delivery in
Adaptive location oriented content delivery inAdaptive location oriented content delivery in
Adaptive location oriented content delivery in
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
VoD Solutions
VoD SolutionsVoD Solutions
VoD Solutions
 
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
QoS Framework for a Multi-stack based Heterogeneous Wireless Sensor Network
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
Project synopsis
Project synopsisProject synopsis
Project synopsis
 
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK
ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK
 

Recently uploaded

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Scheduling Mechanism in Wireless Networks

  • 1. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 215 Paper Publications Scheduling Mechanism in Wireless Networks Deepa .C. G M P Nachimuthu M Jaganathan Engineering College, Chennimalai, Erode, India Abstract: The rapid growth of wireless content access implies the need for content placement and scheduling at wireless base stations. Here study a system under which users are divided into clusters based on their channel conditions, and their requests are represented by different queues at logical front ends. Requests might be elastic (implying no hard delay constraint) or inelastic (requiring that a delay target be met). Correspondingly, we have request queues that indicate the number of elastic requests, and deficit queues that indicate the deficit in inelastic service. In this project, content caching and scheduling are monitored. The user will send request to the server when the base station doesn’t have that file. The user who receives the file will become the base station for that file. To reduce memory consumption, when other user request the same file the base station send s that file delete it. The receiving user will become the base station for that file. Keywords: rapid growth of wireless content access implies placement and scheduling at wireless base stations. I. INTRODUCTION The rapid growth of wireless content access implies the need for content placement and scheduling at wireless base stations. Content might include streaming applications in which chunks of the file must be received under hard delay constraints, as well as file downloads such as software updates that do not have such hard constraints. The core of the Internet is well provisioned, and network capacity constraints for content delivery are at the media vault and at the wireless access links at end-users. Hence, a natural location to place caches for a content distribution network (CDN) would be at the wireless gateway, which could be a cellular base station through which users obtain network access. Furthermore, it is natural to try to take advantage of the inherent broadcast nature of the wireless medium to satisfy multiple users simultaneously. In the existing system, there are multiple cellular base stations (BSs), each of which has a cache in which to store content. The content of the caches can be periodically refreshed through accessing a media vault. The following constraints affect system operation: 1) the wireless network between the caches to the users has finite capacity; 2) each cache can only host a finite amount of content; and 3) refreshing content in the caches from the media vault incurs a cost. II. LITERATURE REVIEW 2.1 User request: Users can make two kinds of requests, namely: 1) elastic requests that have no delay constraints, and 2) inelastic requests that have a hard delay constraint. Elastic requests are stored in a request queue at each front end, with each type of request occupying a particular queue. Here, the objective is to stabilize the queue, so as to have finite delays. For inelastic requests, Here adopt the model users request chunks of content that have a strict deadline, and the request is dropped if the deadline cannot be met. The idea here is to meet a certain target delivery ratio .Each time an inelastic request is dropped, a deficit queue is updated by an amount proportional to the delivery ratio. I would like the average value of the deficit to be zero.
  • 2. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 216 Paper Publications 2.2 Clusters: Here divide users into different clusters, with the idea that all users in each cluster are geographically close such that they have statistically similar channel conditions and are able to access the same base stations. The requests made by each cluster are aggregated at a logical entity that we call a front end (FE) associated with that cluster. The front end could be running on any of the devices in the cluster or at a base station, and its purpose is to keep track of the requests associated with the users of that cluster. 2.3 Queues: Elastic requests are stored in a request queue at each front end, with each type of request occupying a particular queue. Here, the objective is to stabilize the queue, so as to have finite delays. For inelastic requests, we adopt the model proposed in wherein users request chunks of content that have a strict deadline, and the request is dropped if the deadline cannot be met. Each time an inelastic request is dropped, a deficit queue is updated by an amount proportional to the delivery ratio. III. SYSTEM MODEL There are multiple cellular base stations (BSs), each of which has a cache in which to store content. The content of the caches can be periodically refreshed through accessing a media vault. We divide users into different clusters, with the idea that all users in each cluster are geographically close such that they have statistically similar channel conditions and are able to access the same base stations. The requests made by each cluster are aggregated at a logical entity that we call a front end (FE) associated with that cluster. The front end could be running on any of the devices in the cluster or at a base station, and its purpose is to keep track of the requests associated with the users of that cluster. MEDIA VAULT Cache1 Cache 2 Cache n BS 1 BS 2 BS m Wireless Broad cast FE 1 FE 2 FE n System Architecture
  • 3. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 217 Paper Publications There is a set of base stations M and each base station is associated with a cache. The caches are all connected to a media vault that contains all the content. The users in the system are divided into clusters based on their geographical positions, and let N denote the set of these clusters. There are front ends in each cluster, also denoted by n € N whose purpose is to aggregate requests from the users. Time is slotted, and we divide time into frames consisting of D time-slots. Requests are made at the beginning of each frame. There are two types of users in this system—inelastic and elastic—based on the type of requests that they make. Requests made by inelastic users must be satisfied within the frame in which they were made. Elastic users do not have such a fixed deadline, and these users arrive, make a request, are served, and depart. The base stations employ multiple access schemes, and hence each base station can support multiple simultaneous unicast transmissions, as well as a single broadcast transmission. It is also possible to study other scenarios using our framework. Assume that all pieces of content have the same size, and we call the unit of storage and transmission as a chunk. When a channel is ON, it can be used to transmit at most one chunk (per slot).Content is partitioned into two disjoint sets of inelastic content and elastic content. 3.1unicast communications: Requests are to be served using unicast communications. For notational convenience, we assume that transmissions are between base stations and frontends, rather than to the actual users making the requests. First determine the capacity region, which is the set of all feasible requests .Note that this model, in which front ends have independent and distinct channels to the caches, differs from the previously studied wired caching systems because the wireless channels are not always ON. Therefore, the placement and scheduling must be properly coordinated according to the channel states. 3.2 Content expiry: In this section, we study an inelastic caching problem where the contents expire after some time. In this new model, which is compatible with real-time streaming of live events, we only consider inelastic traffic and assume that the lifetime of an inelastic content is equal to the length of a frame. Hence, we can cache a content only for the duration of a frame after which the scontent will not be useful any longer. IV. DISCUSSION 4.1 memory consumption: In the existing project, same contents will be stored in the multiple base stations. User request for the content which is already stored in the multiple base stations. In this case the user will get confused in forwarding the request. The user will get collapsed and send request to multiple base stations. To overcome this problem scheduling part is concentrated mainly in this project. In the content caching and scheduling instead of having multiple base stations for the same content, one base station will have the content. To achieve this kind of scheduling type, when users make the request for the content stored in the base station the base station send the content and it delete the requested content automatically. The user who receives the content becomes the base station for that specific content. In this way the scheduling will take part and the multiple base stations for the same content will be avoided. V. CONCLUSION In the content caching and scheduling instead of having multiple base stations for the same content, one base station will have the content. Multiple base stations will be available but duplicated contents will be restricted. Same contents will not be stored in multiple base stations. Memory consumption will be low in the base stations. It stabilizes the system load within the capacity region. Also minimizes the average expected cost while stabilizing the deflect queues. ACKNOWLEDGEMENT I would like to thank Mr. K.N Sivakumar, HOD, Department of Computer Science and Engineering and my guide Ms. P. Shenmbagavalli, Assistant Professor, Department of Computer Science and Engineering for their wonderful support throughout this project.
  • 4. ISSN 2350-1022 International Journal of Recent Research in Mathematics Computer Science and Information Technology Vol. 2, Issue 1, pp: (215-218), Month: April 2015 – September 2015, Available at: www.paperpublications.org Page | 218 Paper Publications REFERENCES [1] Throughput-Optimal Wireless Scheduling with Regulated Inter-Service Times Ruogu Li, Bin Li, and Atilla Eryilmaz. [2] K. Psounis and B. Prabhakar, ―Efficient randomized Web-cache schemes using samples from past eviction times,‖ ACM Trans. Netw., vol. 10, no. 4, pp. 441–455, Aug. 2002. [3] L. Tassiulas and A. Ephremides, ―Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks,‖ IEEE Trans. Autom. Control, vol. 37, no. 12, pp. 1936–1948, Dec. 1992. [4] L. Tassiulas and A. Ephremides, ―Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks,‖ IEEE Trans. Autom. Control, vol. 37, no. 12, pp. 1936–1948, Dec. 1992. [5] A. Stolyar, ―Maximizing queueing network utility subject to stability: Greedy primal-dual algorithm,‖ Queueing Syst. Theory Appl., vol. 50, no. 4, pp. 401–457, 2005 [6] M. M. Amble, P. Parag, S. Shakkottai, and L. Ying, ―Content-aware caching and traffic management in content distribution networks,‖ in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 2858–2866. [7] N. Abedini and S. Shakkottai, ―Content caching and scheduling in wireless broadcast networks with elastic and inelastic traffic,‖ in Proc. IEEE WiOpt, 2011, pp. 125–132. [8] I. Hou, V. Borkar, and P. Kumar, ―A theory of QoS for wireless,‖ inProc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 486–494. [9] R. M. P. Raghavan, Randomized Algorithms. NewYork, NY,USA: Cambridge Univ. Press, 1995. [10] P. Cao and S. Irani, ―Cost-awareWWWproxy caching algorithms,‖ in Proc. USENIX Symp. Internet Technol. Syst., Berkeley, CA, Dec. 1997, p. 18. [11] N. Laoutaris, O.T. Orestis, V.Zissimopoulos, and I. Stavrakakis, ―Distributed selfish replication,‖ IEEE Trans. Parallel Distrib. Syst., vol. 17, no. 12, pp. 1401–1413, Dec. 2006. Author’s Profile: Deepa C G is currently pursuing Masters Degree Program in computer science and engineering in MP Nachimuthu M Jaganathan Engineering college, Erode- Anna university India, PH:04294250242 Email: deepa120488@gmail.com