Grid computing links together clusters of computers and devices to share processing power and resources. Wireless grids extend this by connecting wireless devices. There are different types of wireless grids including fixed wireless grids with static devices, mobile wireless grids with dynamic devices like phones and laptops, and sensor network grids. Integrating mobile devices into grids presents challenges due to low bandwidth, unreliable connections, and limited device resources. However, wireless grids could utilize the large number of distributed wireless devices and resources.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
Abstract
Spatial big data acts as a important key role in wireless networks applications. In that spatial and spatio temporal problems contains the distinct role in big data and it’s compared to common relational problems. If we are solving those problems means describing the three applications for spatial big data. In each applications imposing the specific design and we are developing our work on highly scalable parallel processing for spatial big data in Hadoop frameworks by using map reduce computational model. Our results show that enables highly scalable implementations of algorithms using Hadoop for the purpose of spatial data processing problems. Inspite of developing these implementations requires specialized knowledge and user friendly.
Keywords: Spatial Big Data, Hadoop, Wireless Networks, Map reduce
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
Mobile cloud computing combines the capabilities of mobile computing and cloud computing. It allows data storage and processing to occur outside of mobile devices in the cloud. This provides advantages like reduced power consumption and memory/storage constraints for mobile devices. Mobile cloud computing applications include mobile commerce, banking, healthcare, gaming and more. By offloading processing and data to the cloud, these applications can have faster performance and better scalability compared to running solely on mobile devices.
This document reviews protocols for mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring, decentralized wireless networks that allow nodes to communicate through wireless links. Routing in MANETs is challenging due to the frequent changes in network topology as nodes move. The document classifies MANET routing protocols as proactive, reactive, or hybrid and discusses examples of each type. It also reviews the evolution of MANET research from early packet radio networks to today's standards and ongoing work. Key challenges for MANET implementations include dynamic topologies, device discovery, and limited bandwidth and power.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
This document presents a study on using artificial intelligence to optimize resource allocation in 5G and beyond 5G cellular networks. It discusses the increasing demand for network resources due to more connected devices and applications. A dynamic nested neural network model is developed that can adjust its structure online to meet the changing resource allocation needs. An AI-driven algorithm called ADRA is used that combines the neural network with a Markov decision process to train a model for dynamic resource allocation in modern cellular networks. The algorithm is found to improve the average resource hit rate and reduce average delay time compared to other methods.
An efficient transport protocol for delivery of multimedia content in wireles...Alexander Decker
1. The document proposes an efficient transport protocol called the Multimedia Grid Protocol (MMGP) for delivering multimedia content over wireless grids.
2. MMGP aims to provide faster, reliable access and high quality of service when streaming multimedia over wireless grid networks, which face challenges like intermittent connectivity, device heterogeneity, weak security, and device mobility.
3. The protocol incorporates a new video compression algorithm called dWave to make streaming more efficient over bandwidth-constrained wireless networks.
An efficient approach on spatial big data related to wireless networks and it...eSAT Journals
Abstract
Spatial big data acts as a important key role in wireless networks applications. In that spatial and spatio temporal problems contains the distinct role in big data and it’s compared to common relational problems. If we are solving those problems means describing the three applications for spatial big data. In each applications imposing the specific design and we are developing our work on highly scalable parallel processing for spatial big data in Hadoop frameworks by using map reduce computational model. Our results show that enables highly scalable implementations of algorithms using Hadoop for the purpose of spatial data processing problems. Inspite of developing these implementations requires specialized knowledge and user friendly.
Keywords: Spatial Big Data, Hadoop, Wireless Networks, Map reduce
This document discusses mobile ad hoc networks (MANETs), which are autonomous wireless networks formed by mobile devices without a fixed infrastructure. It provides an overview of potential MANET applications for emergency situations, enterprise, education, and more. The document also outlines several challenges for MANETs, including routing, service discovery, security, and dealing with the network's dynamic topology without a centralized administration.
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
Mobile cloud computing combines the capabilities of mobile computing and cloud computing. It allows data storage and processing to occur outside of mobile devices in the cloud. This provides advantages like reduced power consumption and memory/storage constraints for mobile devices. Mobile cloud computing applications include mobile commerce, banking, healthcare, gaming and more. By offloading processing and data to the cloud, these applications can have faster performance and better scalability compared to running solely on mobile devices.
This document reviews protocols for mobile ad hoc networks (MANETs). It discusses how MANETs are self-configuring, decentralized wireless networks that allow nodes to communicate through wireless links. Routing in MANETs is challenging due to the frequent changes in network topology as nodes move. The document classifies MANET routing protocols as proactive, reactive, or hybrid and discusses examples of each type. It also reviews the evolution of MANET research from early packet radio networks to today's standards and ongoing work. Key challenges for MANET implementations include dynamic topologies, device discovery, and limited bandwidth and power.
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Implementing K-Out-Of-N Computing For Fault Tolerant Processing In Mobile and...IJERA Editor
Despite the advances in hardware for hand-held mobile devices, resource-intensive applications (e.g., video and imagestorage and processing or map-reduce type) still remain off bounds since they require large computation and storage capabilities.Recent research has attempted to address these issues by employing remote servers, such as clouds and peer mobile devices.For mobile devices deployed in dynamic networks (i.e., with frequent topology changes because of node failure/unavailability andmobility as in a mobile cloud), however, challenges of reliability and energy efficiency remain largely unaddressed. To the best of ourknowledge, we are the first to address these challenges in an integrated manner for both data storage and processing in mobilecloud, an approach we call k-out-of-n computing. In our solution, mobile devices successfully retrieve or process data, in the mostenergy-efficient way, as long as k out of n remote servers are accessible. Through a real system implementation we prove the feasibilityof our approach. Extensive simulations demonstrate the fault tolerance and energy efficiency performance of our framework in largerscale networks.
Performance Analysis of Resource Allocation in 5G & Beyond 5G using AIIRJET Journal
This document presents a study on using artificial intelligence to optimize resource allocation in 5G and beyond 5G cellular networks. It discusses the increasing demand for network resources due to more connected devices and applications. A dynamic nested neural network model is developed that can adjust its structure online to meet the changing resource allocation needs. An AI-driven algorithm called ADRA is used that combines the neural network with a Markov decision process to train a model for dynamic resource allocation in modern cellular networks. The algorithm is found to improve the average resource hit rate and reduce average delay time compared to other methods.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
This document discusses the convergence of cloud computing and the Internet of Things (IoT). It first provides background on both cloud computing and IoT, noting how cloud computing enables distributed computing resources and how IoT involves billions of interconnected devices. It then argues that the cloud features of on-demand access, scalability, and resource pooling are essential for supporting the IoT world. The document also discusses how cloud computing can offer sharing of resources, location independence, virtualization, and elasticity to benefit IoT. Finally, it outlines some challenges of combining IoT and cloud technologies, such as handling large volumes of real-time and unstructured IoT data from distributed sources.
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
This document summarizes a research paper that proposes a path mechanism approach to reduce packet data loss in wireless mesh networks. The paper emphasizes developing a path protocol where the minimum possible packet drop occurs. Wireless mesh networks are vulnerable to denial of service attacks that can cause packet dropping at the routing layer. Evaluating the performance of wireless mesh networks under various levels of packet dropping based on throughput and data packet loss is discussed. Developing an efficient path mechanism is proposed to minimize packet loss and improve network performance.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
This document summarizes a review paper on grid computing. It begins with an introduction to grid computing, describing it as a system that combines distributed computing resources to solve large-scale computational problems. It then discusses the layered grid architecture, including the fabric, connectivity, resource, and collective layers. Next, it outlines different types of grids like computational, data, service, and collaborative grids. It proceeds to examine challenges in grid computing such as security, resource discovery, and heterogeneity. It also describes characteristics of grids like their heterogeneous and user-centric nature. The document concludes by covering topics like grid resource management and security issues in grids.
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
This document discusses security issues related to data management in wireless communication and sensor networks over cloud environments. It begins by describing wireless sensor networks and cloud computing individually, noting key characteristics like location independence and on-demand access. It then discusses how wireless sensor networks and cloud computing can be integrated using technologies like PHP and MySQL. The main body of the document focuses on security challenges in cloud computing environments, including issues related to virtualization, networking, and browser-based attacks that can carry over risks from traditional systems. It concludes that secure data transmission to and from the cloud is an important issue that requires mitigation techniques like encryption algorithms.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesIJAEMSJORNAL
This document discusses a study on using cloud computing to access smart energy metering in the Philippines. Key findings from interviews with industry professionals include:
1) Most participants believed that smart energy meters can be controlled remotely through cloud computing and offer reliable communication.
2) Some applications currently provide accurate data analysis, management, and customer engagement.
3) Participants saw advantages in the scalability, central data storage, cost efficiency, and security provided by cloud-based systems.
This document proposes a new software defined fog platform for internet of things (IoT) architecture that combines software defined networking (SDN) and fog computing. It discusses challenges with traditional cloud computing for IoT including delays and bottlenecks. The proposed platform uses SDN to centrally control network resources and fog computing to process and manage data at the network edge. It describes the SDN and fog architectures and how they are integrated into the platform. Potential uses of the platform are discussed for applications requiring low latency like intelligent traffic management, healthcare networks, industrial robotics, smart cameras, and precision agriculture.
A Review Paper On Viral Mobile Communications SystemMichele Thomas
This document summarizes a research paper on viral mobile communications systems. It begins with an abstract that overviews viral mobile communication technology as an alternative to outdated GSM networks. The introduction discusses how 3G and 4G networks cannot fully satisfy users and discusses applying viral communication theory to solve point-to-point information transfer issues. The paper is then divided into sections that discuss concepts of viral mobile communication including architecture requirements, design principles, models of communication processes, and equations for link capacity in a viral network. It concludes that viral mobile communication could enable scalable, self-configuring networks to improve wireless services.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
My School Essay Writing - College Homework Help AJim Jimenez
This document provides instructions for students to get homework help from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, and the website guarantees original, high-quality work or a full refund.
017 Difference Between Paragraph And Essay PptJim Jimenez
The document compares gender expectations for King Henry V and Joan of Arc during their historical time periods. For Henry V, there were doubts about his manhood as king, but he proved himself through his actions and beliefs. Joan of Arc challenged expectations as a woman by her achievements in battle, showing that gender should not determine one's capabilities. Both figures went against stereotypes of their time to accomplish great things through their character and convictions.
This document discusses the vision of a cloud-centric Internet of Things. It describes how ubiquitous sensing through wireless sensor networks can measure environmental indicators across many areas of life. As these sensing devices proliferate in communicating networks, they create the Internet of Things by seamlessly blending sensors and actuators with our environment. This generates enormous amounts of data that must be stored, processed, and presented seamlessly through cloud computing as a unifying framework. The document outlines key enabling technologies like RFID, wireless sensor networks, and addressing schemes. It also discusses applications, challenges, and the future direction of cloud-based IoT.
IRJET - Cloud Computing and IoT ConvergenceIRJET Journal
This document discusses the convergence of cloud computing and the Internet of Things (IoT). It first provides background on both cloud computing and IoT, noting how cloud computing enables distributed computing resources and how IoT involves billions of interconnected devices. It then argues that the cloud features of on-demand access, scalability, and resource pooling are essential for supporting the IoT world. The document also discusses how cloud computing can offer sharing of resources, location independence, virtualization, and elasticity to benefit IoT. Finally, it outlines some challenges of combining IoT and cloud technologies, such as handling large volumes of real-time and unstructured IoT data from distributed sources.
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
This document summarizes a research paper that proposes a path mechanism approach to reduce packet data loss in wireless mesh networks. The paper emphasizes developing a path protocol where the minimum possible packet drop occurs. Wireless mesh networks are vulnerable to denial of service attacks that can cause packet dropping at the routing layer. Evaluating the performance of wireless mesh networks under various levels of packet dropping based on throughput and data packet loss is discussed. Developing an efficient path mechanism is proposed to minimize packet loss and improve network performance.
ERMO2 algorithm: an energy efficient mobility management in mobile cloud comp...IJECEIAES
Recently, mobile devices are becoming the primary platforms for every user who always roam around and access the cloud computing applications. Mobile cloud computing (MCC) combines the both mobile and cloud computing, which provides optimal services to the mobile users. In next-generation mobile environments, mainly due to the huge number of mobile users in conjunction with the small cell size and their portable information‟s, the influence of mobility on the network performance is strengthened. In this paper, we propose an energy efficient mobility management in mobile cloud computing (E2M2MC2) system for 5G heterogeneous networks. The proposed E2M2MC2 system use elective repeat multi-objective optimization (ERMO2) algorithm to determine the best clouds based on the selection metrics are delay, jitter, bit error rate (BER), packet loss, communication cost, response time, and network load. ERMO2 algorithm provides energy efficient management of user mobility as well as network resources. The simulation results shows that the proposed E2M2MC2 system helps in minimizing delay, packet loss rate and energy consumption in a heterogeneous network.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
Call for paper 2012, hard copy of Certificate, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJCER, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, research and review articles, IJCER Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathematics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer review journal, indexed journal, research and review articles, engineering journal, www.ijceronline.com, research journals,
yahoo journals, bing journals, International Journal of Computational Engineering Research, Google journals, hard copy of Certificate,
journal of engineering, online Submission
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document summarizes performance evaluation in wireless networks. It discusses how mobile ad hoc networks are self-configuring networks of wireless devices that can communicate directly or through intermediate nodes. It outlines some key characteristics of MANETs including dynamic topology, bandwidth constraints, and energy constraints. It also discusses different routing approaches for MANETs such as proactive (table-driven) and reactive (on-demand) protocols. Finally, it provides an overview of the operating principles of MANETs through an example network topology.
This document summarizes a review paper on grid computing. It begins with an introduction to grid computing, describing it as a system that combines distributed computing resources to solve large-scale computational problems. It then discusses the layered grid architecture, including the fabric, connectivity, resource, and collective layers. Next, it outlines different types of grids like computational, data, service, and collaborative grids. It proceeds to examine challenges in grid computing such as security, resource discovery, and heterogeneity. It also describes characteristics of grids like their heterogeneous and user-centric nature. The document concludes by covering topics like grid resource management and security issues in grids.
Grid computing or network computing is developed to make the available electric power in the similar way
as it is available for the grid. For that we just plug in the power and whoever needs power, may use it. In
grid computing if a system needs more power than available it can share the computing with other
machines connected in a grid. In this way we can use the power of a super computer without a huge cost
and the CPU cycles that were wasted previously can also be utilized. For performing grid computation in
joined computers through the internet, the software must be installed which supports grid computation on
each computer inside the VO. The software handles information queries, storage management, processing
scheduling, authentication and data encryption to ensure information security.
This document discusses security issues related to data management in wireless communication and sensor networks over cloud environments. It begins by describing wireless sensor networks and cloud computing individually, noting key characteristics like location independence and on-demand access. It then discusses how wireless sensor networks and cloud computing can be integrated using technologies like PHP and MySQL. The main body of the document focuses on security challenges in cloud computing environments, including issues related to virtualization, networking, and browser-based attacks that can carry over risks from traditional systems. It concludes that secure data transmission to and from the cloud is an important issue that requires mitigation techniques like encryption algorithms.
The common challenges of mobile internet for up coming generationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
The common challenges of mobile internet for up coming generationeSAT Journals
Abstract In this survey we concentrate on the mobile internet. Our main focus on mobile internet in two different cases of fixed connection which is provided by the telecommunication network provider and the second one is the wireless network which is getting from internet access point can be home network, Education campus .etc; in this case we also would like to discuss about network layer (protocols and Transport layer protocols).
MOVEMENT ASSISTED COMPONENT BASED SCALABLE FRAMEWORK FOR DISTRIBUTED WIRELESS...ijcsa
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are
deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in
improving the scalability and enhancing performance by enabling direct and real-time communication
among the participating network stations. A suitable solution for resource management in distributed wireless systems is required which should support fault-tolerant operations, requested resources (at shortest path), minimize overhead generation during network management, balancing the load distribution between the participating stations and high probability of lookup success and many more. This article
presents a Movement Assisted Component Based Scalable Framework (MAC-SF) for the distributed
network which manages the distributed wireless resources and applications; monitors the behavior of the
distributed wireless applications transparently and attains accurate resource projections, manages the
connections between the participating network stations and distributes the active objects in response to the
user requests and changing processing and network conditions. This system is also compared with some
exiting systems. Results shows that MAC-SF is a better system and can be used in any wireless network.
A Cloud-based Online Access on Smart Energy Metering in the PhilippinesIJAEMSJORNAL
This document discusses a study on using cloud computing to access smart energy metering in the Philippines. Key findings from interviews with industry professionals include:
1) Most participants believed that smart energy meters can be controlled remotely through cloud computing and offer reliable communication.
2) Some applications currently provide accurate data analysis, management, and customer engagement.
3) Participants saw advantages in the scalability, central data storage, cost efficiency, and security provided by cloud-based systems.
This document proposes a new software defined fog platform for internet of things (IoT) architecture that combines software defined networking (SDN) and fog computing. It discusses challenges with traditional cloud computing for IoT including delays and bottlenecks. The proposed platform uses SDN to centrally control network resources and fog computing to process and manage data at the network edge. It describes the SDN and fog architectures and how they are integrated into the platform. Potential uses of the platform are discussed for applications requiring low latency like intelligent traffic management, healthcare networks, industrial robotics, smart cameras, and precision agriculture.
A Review Paper On Viral Mobile Communications SystemMichele Thomas
This document summarizes a research paper on viral mobile communications systems. It begins with an abstract that overviews viral mobile communication technology as an alternative to outdated GSM networks. The introduction discusses how 3G and 4G networks cannot fully satisfy users and discusses applying viral communication theory to solve point-to-point information transfer issues. The paper is then divided into sections that discuss concepts of viral mobile communication including architecture requirements, design principles, models of communication processes, and equations for link capacity in a viral network. It concludes that viral mobile communication could enable scalable, self-configuring networks to improve wireless services.
The document provides an introduction to the Global Internet of Things (IoT). It defines IoT as a system of interconnected computing devices, machines, objects, animals or people that can transfer data over a network without requiring human interaction. It discusses how IoT is the next phase of development after the Internet of computers and mobile phones. The document outlines several key technologies that enable IoT, including RFID, wireless networks, sensors, cloud computing and energy harvesting. It also discusses the architecture, applications, market and impact of digital transformation of IoT.
Towards Pervasive Computing Environments With Cloud Servicesijsptm
The document proposes an infrastructure called UbiCloud that incorporates pervasive computing environments with cloud services. UbiCloud has two main components: 1) a cloud computing component that provides scalable services through models like IaaS, PaaS, and SaaS, and 2) a ubiquitous computing component that includes a service directory, user agents, and mobile users. The infrastructure aims to address limitations of pervasive computing like limited resources and availability by utilizing the on-demand resources and services of the cloud. It describes a protocol for interaction between entities, such as cloud services registering with the service directory and user agents requesting services on behalf of mobile users.
An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of M...ijtsrd
Nowadays Mobile Ad Hoc Network MANET is an emerging area of research to provide various communication services to the end users. Recently the fields of MANET have yielded more and more popularity and thus MANET have become a subject of great interest for the researchers to enforce research activities. One of the main challenges in Mobile ad hoc network is of searching and maintaining an effective route for transporting data information securely. Security and privacy are indispensable in various communications for successful acceptance and deployment of such a technology. Mobile Ad Hoc Network MANET is the cooperative engagement of a collection of mobile nodes without the required intervention of any centralized access point or existing infrastructure. There is an increasing trend to adopt mobile ad hoc networking for commercial uses however, their main applications lie in military, tactical and other security sensitive operations. In these and other applications of mobile ad hoc networking, secure routing is an important issue. Thinking of this, I proposed an efficient secure ad hoc routing protocol for optimize the performance of MANET which will more efficient in terms of time delay, packet drop and packet delivery fraction in mobile ad hoc network. The proposed protocol can employ an integrated approach of digital signature and encryption techniques to achieve the security goals like message integrity, data confidentiality and end to end authentication at IP layer. Together with existing approaches for securing the physical and MAC layer within the network protocol stack, the proposed secure routing protocol can provide a foundation for the secure operation of an ad hoc network. Md. Torikur Rahman ""An Efficient Secure Ad Hoc Routing Protocol for Optimize the Performance of Mobile Ad Hoc Network (MANET)"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23727.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/23727/an-efficient-secure-ad-hoc-routing-protocol-for-optimize-the-performance-of-mobile-ad-hoc-network-manet/md-torikur-rahman
A Comparison of Cloud Execution Mechanisms Fog, Edge, and Clone Cloud Computing IJECEIAES
Cloud computing is a technology that was developed a decade ago to provide uninterrupted, scalable services to users and organizations. Cloud computing has also become an attractive feature for mobile users due to the limited features of mobile devices. The combination of cloud technologies with mobile technologies resulted in a new area of computing called mobile cloud computing. This combined technology is used to augment the resources existing in Smart devices. In recent times, Fog computing, Edge computing, and Clone Cloud computing techniques have become the latest trends after mobile cloud computing, which have all been developed to address the limitations in cloud computing. This paper reviews these recent technologies in detail and provides a comparative study of them. It also addresses the differences in these technologies and how each of them is effective for organizations and developers.
Cooperative hierarchical based edge-computing approach for resources allocati...IJECEIAES
Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged to satisfy such demands, by providing an extension for cloud resources at the network edge, and consequently, they become closer to end-user devices. In this paper, exploiting edge resources is studied; therefore, a cooperative-hierarchical approach for executing the pre-partitioned applications’ modules between edges resources is proposed, in order to reduce traffic between the network core and the cloud, where this proposed approach has a polynomial-time complexity. Furthermore, edge computing increases the efficiency of providing services, and improves end-user experience. To validate our proposed cooperative-hierarchical approach for modules placement between edge nodes’ resources, iFogSim toolkit is used. The obtained simulation results show that the proposed approach reduces network’s load and the total delay compared to a baseline approach for modules’ placement, moreover, it increases the network’s overall throughput.
Similar to A Review On Wireless Grid Computing (20)
My School Essay Writing - College Homework Help AJim Jimenez
This document provides instructions for students to get homework help from the website HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, and the website guarantees original, high-quality work or a full refund.
017 Difference Between Paragraph And Essay PptJim Jimenez
The document compares gender expectations for King Henry V and Joan of Arc during their historical time periods. For Henry V, there were doubts about his manhood as king, but he proved himself through his actions and beliefs. Joan of Arc challenged expectations as a woman by her achievements in battle, showing that gender should not determine one's capabilities. Both figures went against stereotypes of their time to accomplish great things through their character and convictions.
40 Can You Use The Same Essay For DifferentJim Jimenez
1. The passage discusses rational choice theory and its application to understanding criminal behavior. Rational choice theory posits that criminal behavior is similar to noncriminal behavior, in that individuals commit crimes because they perceive the rewards to outweigh the risks/punishment.
2. Research on the death penalty has been conducted to test the deterrence hypothesis derived from rational choice theory. However, the evidence so far has not clearly proven that capital punishment deters crimes more effectively than life imprisonment without parole.
3. More research, such as comparing murder rates in states with versus without the death penalty, would be needed to definitively determine whether the deterrence hypothesis derived from rational choice theory is valid.
Printable Frog Writing Paper Curbeu Co UkJim Jimenez
1. The document provides instructions for creating an account and submitting a paper writing request on the HelpWriting.net website.
2. Users complete a 10-minute order form with instructions, sources, and deadline before writers bid on the request.
3. Users choose a writer based on qualifications, history, and feedback, make a deposit, and the writer begins work. Revisions are allowed.
013 Essay Example Historiographical GlamoroJim Jimenez
The document discusses interracial marriage and whether it should be permitted or rejected. It notes that interracial relationships and marriage rates have increased dramatically in the US in recent decades as barriers have been overcome. However, some arguments are made on both sides of the issue, with some arguing it should be permitted for reasons of equality and acceptance, while others argue it could be rejected due to concerns about preserving cultural identity or traditions.
Scholarship Essay Sample About Why I Deserve TheJim Jimenez
Here are the responses to the accounting homework questions:
1. Prepare the adjusting entry for depreciation of equipment for the year.
Debit Depreciation Expense $12,000
Credit Accumulated Depreciation - Equipment $12,000
2. Prepare the adjusting entry for unearned revenue from gift certificates sold.
Debit Cash $4,000
Credit Unearned Revenue $4,000
3. Prepare the adjusting entry to record prepaid rent for the upcoming year.
Debit Prepaid Rent $6,000
Credit Cash $6,000
4. Prepare the adjusting entry to record accrued utilities.
Debit Utilities Expense $1,500
Lined Printable A4 Paper Letter Writing Personal UsJim Jimenez
This document discusses how people's experiences with death and dying are shaped by social and cultural factors. It notes that socioeconomic conditions like standard of living, infrastructure, diet, disease, war, and disasters all influence perspectives on end of life. Culture, identity, and personal beliefs also impact individual choices around dying. The document argues that healthcare workers should receive training to understand diverse social and emotional needs around aging and death across different cultures in order to provide dignified, patient-centered end-of-life care.
College Pressures Essay 1 VOL.1 .Docx - Economic SeJim Jimenez
This document describes an experiment using a BeagleBone Black to operate an LED via a push button and light dependent resistor (LDR) using C code. The objective is to illuminate the LED when it is dark based on the LDR reading and allow manual override via the push button. The setup exports GPIO pins on the BeagleBone Black to read the push button and LDR without external libraries. When executed, the C program controls the LED based on LDR readings, recording on/off times, and allows the push button to manually toggle the LED regardless of the LDR state.
Mla Format Double Spaced Essay - Term Paper DoublJim Jimenez
This document provides instructions for requesting assistance with writing assignments from HelpWriting.net. It outlines a 5-step process: 1) Create an account with a password and email. 2) Complete an order form with instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions until satisfied, with the option of a full refund for plagiarized work. The document emphasizes HelpWriting.net's commitment to original, high-quality content.
012 Essay Example College Application Examples ThJim Jimenez
The document provides instructions for requesting writing assistance from HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and select one. 4) Review the completed paper and authorize payment. 5) Request revisions to ensure satisfaction, with the option of a full refund for plagiarized work.
Ursula Kroeber Le Guin delivered a commencement speech titled "A Left-Handed Commencement Address" to highlight ongoing issues of gender inequality. She notes that while much progress has been made for women's rights since 1848, discrimination still exists as some companies deny women certain jobs and pay women less than men in the same role. The speech aims to bring attention to areas where further advancement is still needed to establish full equality between the sexes.
Samples Of Dissertation Proposals. Writing A DisserJim Jimenez
The three Republican presidents of the 1920s - Warren G. Harding, Calvin Coolidge, and Herbert Hoover - faced both domestic and foreign policy challenges. Harding's presidency was overshadowed by scandals within his administration. Coolidge reduced taxes and the national debt. Hoover was president during the 1929 stock market crash and onset of the Great Depression, believing incorrectly that the economy would recover on its own.
Sample National Junior Honor Society Essay TelJim Jimenez
1. The author reflects on past regrets and watching two people who later became allies interacting easily like old friends with a deep bond and respect.
2. The author was initially fascinated and curious about their close relationship that resembled dancing in unison, seeing a reflection of themself in the pair.
3. However, the author was unsure whether to intrude on their long-standing friendship for the author's own sake and curiosity, which both scared and fascinated them.
Papers 9 Essays Research Essay Example Apa Template Microsoft WorJim Jimenez
The document provides instructions for creating an account and submitting a request for paper writing assistance on the HelpWriting.net website, which uses a bidding system where writers submit bids and the customer chooses a writer based on qualifications. The process includes registering with a password and email, completing an order form with instructions and deadline, reviewing writer bids and choosing one, making a deposit, and having the option to request revisions until satisfied with the final paper.
Personalised Luxury Writing Paper By Able Labels NotJim Jimenez
The letter argues that John Green's novel "Looking For Alaska" should not be banned by the school board despite containing some challenging content. It states the book has relatable characters and important themes. While it addresses censorship topics, the letter focuses on why the book specifically should not be censored rather than discussing censorship in general.
Homework Help Best Topics For An Argumentative EssaJim Jimenez
The document provides steps for getting homework help from the website HelpWriting.net. It outlines registering for an account, completing an order form with instructions and deadline, reviewing bids from writers and choosing one, and authorizing payment after receiving the completed paper. It notes that free revisions are provided and plagiarized work will result in a full refund.
🌈 Essay Writing My Teacher. Essay On MyJim Jimenez
1. Food insecurity, or limited access to healthy and nutritious food, is a major social determinant of health that affects nearly 50 million Americans.
2. Food insecurity is associated with worse health outcomes such as depression, poor management of chronic diseases, and worse HIV outcomes. It can also negatively impact control of conditions like blood glucose, blood pressure, and cholesterol.
3. Individual interventions that can help address food insecurity include breastfeeding and community programs that increase access to affordable healthy foods. Addressing food insecurity at both the individual and societal level is important for improving public health.
Guide To The 2019-20 Columbia University SupplJim Jimenez
The document provides guidance for completing an assignment through HelpWriting.net in 5 steps: register for an account, complete an order form with instructions and deadline, review bids from writers and choose one to complete the assignment, review and approve the completed paper, and request revisions if needed to ensure satisfaction with the final product. The process aims to match students with qualified writers to meet assignment needs through original, high-quality content or a full refund if plagiarized.
Help Writing Papers For College - The Best Place TJim Jimenez
The document provides instructions for getting help writing college papers from HelpWriting.net. It outlines a 5-step process: 1) Create an account; 2) Complete an order form providing instructions, sources, and deadline; 3) Review bids from writers and choose one; 4) Review the completed paper and authorize payment; 5) Request revisions to ensure satisfaction and get a refund if plagiarized. The service aims to fully meet customer needs through high-quality, original content.
Essay Def. What Is An Essay The Definition And Main Features OfJim Jimenez
William Sumner was an American sociologist born in 1840 who made major contributions to the field. He studied at Yale and in Europe, and taught at Yale for many years. Sumner introduced important concepts like ethnocentrism and folkways. He was influenced by Herbert Spencer and influenced many later sociologists through his writings. Sumner studied a variety of topics and published extensively, making him a founder of modern sociology in the United States.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
1. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
469
Abstract— Grid Computing is a concept, a network, a work
in progress, part hype and part reality, and it is increasingly
capturing the attention of the computing community. It uses
clusters of personal computers, servers or other machines. They
link together to tackle complex calculations. In part, grid
computing lets companies harness their unused computing
power, or processing cycles, to create a type of supercomputer.
Wireless grids extend the capability of grid computing to
wireless devices. The number of users using laptops, PDAs, cell
phones, and other wireless devices is increasing leading to more
networked wireless devices, and creating a vast collective
potential of unexploited resources. Wireless grid computing
with its model of coordinated resource sharing may provide a
way to utilize such resources that are normally distributed
throughout a grid. We may have Gridnet in the future as we
have Internet today. This paper presents a state-of-the-art
review of wireless grid computing.
Index Terms— Grid computing, Wireless grid computing,
Grid standards.
I. INTRODUCTION
Grid computing [1], [2] is an important and developing
computing initiative that involves the aggregation of network
connected computers to form a large-scale, distributed
system for coordinated problem solving and resource sharing.
By spreading computing workload across the distributed
system of computers, grid users can take advantage of
enormous computational, storage, and bandwidth resources
that would otherwise only be available within traditional
multiprocessor supercomputers. To give an analogy, grid
computing is similar to power grids, where user does not
need to know anything about what stays beyond the socket.
One can absorb all the power he/she wants according to the
agreement with electrical society. Grid computing has
attracted worldwide attention in a variety of applications
ranging from physics, chemistry, environment, aerospace
and healthcare systems [3], [4].
Wireless grid computing is evolving because of the fast
developments in wireless technology and grid computing
technology. Wireless grids extend the capability of grid
computing to wireless devices. Wireless grid computing
supports sharing of these resources by mobile, and fixed
wireless devices within the virtual organizations. It may
include devices like laptops, mobiles, PDAs, sensors, etc.,
*was with Basaveshwar Engineering College, Bagalkot, Karnataka, India.
He is now with Department of Electronics and Communication Engineering,
Reva Institute of Technology and Management, Bangalore, India. (e-mail:
agentsun2002@yahoo.com).
**is with Department of Information Science & Engineering,
Basaveshwar Engineering College, Bagalkot, Karnataka, India (e-mail:
mnbirje@yahoo.com).
while the resources of these devices can be processor,
memory, bandwidth, code repositories, softwares, etc. [5].
Generally wireless devices are characterized by reduced
CPU performance, small secondary storage, heightened
battery consumption sensitivity, and unreliable
low-bandwidth communication. But these devices also may
include such additions as cameras, microphones, bar code
and RFID readers, GPS receivers and satellite receiver/
transmitters as well as a wide variety of special purpose
sensors. Among the many types of sensors currently
available are those that measure temperature, air pressure and
humidity, those that detect movement, and those that measure
radiation and particulate levels.
In general characteristics of wireless grid can be
summarized as follows:
• No centralized control.
• Consists of small, low powered devices.
• Includes heterogeneous resources, applications and
interfaces.
• New types of resources like cameras, GPS trackers
and sensors can be shared among grid devices.
• Dynamic and unstable users / resources.
• Geographically dispersed resources, with different
management policies.
• Different security requirement and policies.
The reason for increased scope, popularity, and usage of
mobile wireless devices is their small size, low cost, easy
handling, and mobility. The device mobility facilitates the
user to transparently share the grid resources, execute their
tasks, and obtain instantaneous results while they are
roaming. Rapid advances in miniaturization, increasing
processing power and feature-rich operating systems and
applications, along with the proliferation of wireless access
points have quickly expanded the usefulness of these devices
and made them increasingly capable of taking part in grid
networks. The rapid drop in the cost of wireless devices,
coupled with the ease of installation for fixed location use,
has made them a cost-effective option for small business as
well as the general public for mobile use and for home
networking [6].
Wireless mobile devices have become an indispensable
tool for businesses large and small, especially those where
employees must perform their duties away from the office
such as field workers or sales representatives [7]. The
increasing reliance on these devices has increased the pace at
which applications for these devices are developed, as well as
expanding the scope and functionality of these applications.
As more of these devices are deployed, more potential uses
for them are being identified.
While the Grid is the best way to achieve large-scale
resource sharing in a heterogeneous environment, the mobile
community has to face many challenges to enter this
A Review on Wireless Grid Computing
S. S. Manvi*, Member, IACSIT and M. N. Birje**
2. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
470
application domain. The integration of mobile devices is
extremely challenging because of the many deficiencies that
wireless communication and mobile devices have. Wireless
networks are of low bandwidth and reliability, while mobile
devices have much less resources available than desktop
computers. Since the purpose of the Grid is to provide a
highly available, consistent and ubiquitous environment,
integrating mobile devices into the Grid, through wireless
links, could degrade all relevant quality of service
requirements.
Following an introduction the rest of paper is organized to
include wireless grid architectures in section II, challenges in
section III, applications in section IV, tools and standards in
section V, and finally conclusion in section VI.
II. WIRELESS GRID ARCHITECTURES
Wireless grid architectures can be broadly classified into
the following four categories [7, 8] based on the devices
predominant in the grid and the relative mobility of the
devices in the grid.
• Fixed Wireless Grids
• Mobile or Dynamic Wireless Grids
• Ad Hoc grids
• Sensor Network Grids
Fixed Wireless grids: The wireless grid extends grid
resources to wireless devices of varying sizes and
capabilities such as sensors, laptops, special instruments, and
edge devices, where these devices are usually static. In
wireless grids, wireless devices can act as real grid nodes
where part of data processing and storage is taking place. In a
special type of wireless grid, all wireless devices are
considered pure access devices without processing or storage
capabilities [8]; required resources are obtained from a wired,
resource-rich backbone grid. Many technical concerns arise
when integrating wireless devices into a grid. These include
low bandwidth and high security risks, power consumption,
and latency. So, several communities, including the
Interdisciplinary Wireless Grid Team (www.wireless
grids.net) are exploring these new issues to ensure that future
grid peers can be wireless devices.
Mobile Or Dynamic Wireless Grids: Mobile grids make
grid services accessible through mobile devices such as
PDAs and smart phones. As the processing power and other
capabilities of these mobile devices increases, researchers
and commercial organizations are discovering new ways to
use and share their resources. When the large numbers of
available wireless devices is considered, the potential of
these dynamic ad hoc connections becomes vast [9]. Through
wireless grid connections, these devices are able to connect to
the Internet, provide peer-to-peer networking, take advantage
of the resources of wired grid networks and make their own
resources available to the wired grids [7].
In emergency situations, such as during natural disasters
and on battle fields, wireless mobile devices might be the
only available communication and computation services. The
mobile devices integrated into grid systems can actively
participate and provide computational or data services [10].
These mobile devices also serve as an interface to a stationary
grid for sending requests and receiving results . Sometimes
this approach is labeled mobile access to grid infrastructure,
or simply mobile access grids. Recently, researchers have
made numerous efforts toward establishing mobile grids.
Researchers have proposed various techniques for
implementing the mobile grid vision, including centralized
and P2P structure, intelligent mobile agents, mobile grid
middleware, and many more [10]-[13]. Existing mobile grid
projects include Akogrimo (www.mobilegrids.org), and
MADAM (www.intermedia.uio.no/display/madam/Home).
Ad Hoc grids : Mobile ad hoc network consists of devices
with a high degree of heterogeneity. These mobile devices
range from relatively powerful computing systems carried by
a vehicle, to very tiny, low-power sensors that can be
implanted in the human body. Although they may know little
about the identities and capabilities of each other, a group of
mobile devices are able to organize a highly dynamic and
infrastructure-less ad-hoc network, in which nodes can
communicate in a hop-by-hop manner. We have to integrate
the resource aggregation model of grid with mobile ad hoc
networks, so as to build a mobile ad-hoc Grid platform that
can be instantly constructed anytime, anywhere [14]. Having
been constructed from a group of mobile devices, an ad-hoc
grid would allow the networked devices to accomplish a
specific mission that maybe beyond an individuals computing
or communication capacity. Examples of applications of
mobile ad-hoc grids can be disaster management, wildfire
fighting, and e-healthcare emergency, etc. The general
attributes of mobile ad hoc networks can be extended to ad
hoc grids and hence ad hoc grids are attributed by bandwidth
and power constraints, multi-hop delivery, network
partitioning, and infrastructure unpredictability.
Sensor Network Grids : Sensor networks are composed
of tiny devices that are generally dedicated to a single
purpose. Though each device in the grid is dedicated to a
single purpose, the grid itself may be comprised of a number
of different types of devices in order to accomplish the goals
of the particular grid. As described in [15], wireless sensor
networks integrate detection, processing and communication
into the grid. The sensors taking part in a sensor grid may be
stationary once they have been deployed [16] or they may be
mobile. Sensor networks are currently in use monitoring
environmental factors such as temperature or humidity
change, motion and light intensity. The developments in
sensor networks is leading to advances in agriculture,
physical building security, firefighting, warfare and a number
of industrial areas. Wireless sensor network that can be
deployed in residential and commercial buildings to monitor
human presence and turn off the lights when no people are
detected [17], is under development by Dust Networks of
Berkeley, California. RFID technology to track products
from manufacture through distribution and delivery and,
potentially, to the consumers shopping cart leaving the store
[18], is developed.
III. CHALLENGES IN WIRELESS GRIDS
Due to mobile nature of wireless devices and limitations of
wireless communications a number of unique challenges
3. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
471
must be overcome when building a grid application for such
devices. Applications must be capable of adjusting to
frequent disconnections of specific devices from the grid.
Large distributed grid systems pose new challenges in job
scheduling due to complex workload characteristics and
system characteristics. Due to the numerous parameters that
must be considered and the complex interactions that can
occur between different resource allocation policies, it
encounters lot many challenges. Some of the requirements
and challenges of wireless grids are discussed in brief as
follows.
• Resource status monitoring: Monitoring is the act of
collecting information concerning the characteristics and
status of resources of interest. Monitoring system must be
able to provide information about the current state of
various resources such as static, and dynamic resources,
and generate alarms whenever certain important events
occur. It is responsible for monitoring the overall health of
grid. To provide an up-to-date resources status information
a device can be monitored either continuously or
periodically or when some event occurs. Some works are
done to address this issue. Globus toolkit consists of
monitoring software called Monitoring and Discovery
System (MDS) [19]. The information sources are
registered to index servers in MDS [20]. The users can
query directory servers to obtain detailed descriptions
about resources. Three different methods called as regular,
skewed, and interleaved methods are proposed in [21] to
monitor resource status of a device in wireless grid.
• Resource status updation and communication : In order
to keep up-to-date resource’s status, a continuous
monitoring is needed. The increase in number of status
delivery of such monitored observations will consume lot
much of bandwidth, making the database size of
monitoring server to grow continuously over a period of
time. So it is very much essential to keep track of only
relevant changes and communicate instantly. In the paper
[22], a Grid Resource Information Monitoring (GRIM)
prototype is introduced. To support the constantly
changing resource states in the GRIM prototype, the
push-based data delivery protocol named Grid Resource
Information Retrieving is provided. To monitor grid
infrastructure and to maintain system-wide invariants and
detect abnormal events with minimal communication
overhead, paper [23] presents threshold based distributed
triggering mechanism. The work given in [24], [25] solved
the problem of detecting threshold violations with
specified accuracy while minimizing communication
overhead, as well as providing the flexibility for users to
trade off communication overhead with detection
accuracy.
• Authentication and Authorization of device/user: Since
the system is built upon a wireless and pervasive network, it
will be more difficult to perform authentications and to
provide general security mechanisms. The authentication of
devices and users as they enter the grid presents additional
complexities in wireless grids. To access any grid resources
or services, each device and user has to be authorized.
Though a number of researchers have recognized this
difficulty of identity verification in ad hoc wireless grids,
few solutions have been forthcoming. The current accepted
identity management mechanism relies on the same digital
signature certificates in use on the wired Internet. The
works given in [9], [26] discuss the need of this issue.
• Resource description : It is the formal process to describe
the resources to be shared. The heterogeneity of grid
devices, operating systems they use, services they provide,
data they represent needs a standard to describe the
resources so that any wireless grid can utilize the services.
Some standards for resource description [27] include XML,
RDF, and OWL.
• Resource discovery: The concept of resource sharing in
grid computing is realized by service discovery
mechanisms which transparently and seamlessly locate
available resources/services throughout the grid
infrastructure upon request. Since user wants the service as
faster as possible at reasonable cost, service discovery
becomes more important issue in grid computing [27], [28].
Hence proper publishing, indexing, and cataloguing of
shared resources become very essential. Standards such as
GRDL, WSDL etc. are available for resource discovery.
• Resource allocation: Since these wireless devices are
more constrained in their processing power, memory, and
bandwidth, many users compete for these scarce resources.
Some economic market model is preferred to allocate the
resources on price basis. Proper job scheduling and/or
resource allocation becomes very crucial in order to
provide efficient service to grid users. A survey on resource
allocation in service oriented grids is presented in [29].
Resource allocation has to be done following the
administrative policies, and the conditions under which
devices will extend access to other devices.
• Routing of messages through the grid: This area is
concerned with the reduction of power consumption but
through efficiency in the routing of messages. A second
concern is the reduction of message latency.
• Power consumption : Since mobile devices are resource
constrained, identifying techniques to reduce power
consumption to extend battery life while retaining
acceptable levels of service is an issue. This is particularly
important in wireless sensor grids due to the small size of
the sensors and the difficulty of replacing those that fail.
The work presented in [30] -[32] discusses about reducing
the power consumption and routing the information via the
paths that reduces power consumption.
• Mobility: If the devices in the grid are highly mobile, it will
adversely impact on the time taken to perform a
computationally-intensive task. The mobility of the devices
causes network instability leading to poor QoS. In a
resource-sharing environment such as the wireless grid,
mobility causes loss of data resulting in potentially
erroneous outcomes. The work in [12], [13] described an
impact of mobility in wireless grid environment and
presented an architecture that tries to minimize the negative
effects of mobility.
• Information Security: Security of the information
processed by the application is another main issue. Due to
their wireless nature, devices in the grid communicate and
pass information over standard radio frequencies that can
be easily tapped. A number of encryption standards such as
WEP and WPA have been devised to ensure data security
and integrity over these otherwise insecure transmission
frequencies.
• Fault management: The frequent failures of mobile nodes
4. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
472
or communication links would always negatively impact
the performance of the whole system. The issue of
managing the fault that may occur because of device
mobility, battery failure, or sudden switch off of a device is
of major concern.
• Energy-efficient medium access: The media access
schemes must use low-power communications and must be
able to maintain higher throughput and lower delays. An
energy efficient MAC protocol for wireless sensor
networks is presented in [30]. Energy consumption is
crucial for the lifetime of battery-limited mobile devices as
well as the whole system. To make Grid functionalities
feasible in the network of mobile devices, energy efficiency
should be the major concern for their implementation in
each node.
• Communication Paradigms: The complex environment
and the mobility of the devices can lead to frequent
disconnections in the wireless grids degrading the
performance. Hence a proper communication methodology
becomes more essential. The traditional communication
approach called Socket programming is not suitable for
complex environments in which security, heterogeneity
issues are to be considered. Remote Procedure Call (RPC),
is a classical approach for client server communication.
While RPC is well suited to the procedural programming
paradigm, it is not directly applicable to the object-oriented
programming style that has gained much popularity in
recent years. So Remote Method Invocation (RMI) is
evolved that integrates the distributed object model into the
Java language in a natural way. In RMI Remote objects can
be passed as parameters in remote method calls.
Distributed Component Object Model (DCOM), is an
extension to COM for distributed client/server applications
[33] and uses a protocol called Object Remote Procedure Call
(ORPC) to invoke remote COM components. Common
Object Resource Broker Architecture (CORBA) is an
object-oriented middleware infrastructure for distributed
client/server applications. It uses Internet-Inter ORB protocol
(IIOP) to invoke remote objects. Now a days other
communication paradigm called as Agent Technology is of
more interest. Software agents are the autonomous programs
situated within an environment, which sense the environment
and acts upon it to achieve their goals. The paper [34], [35]
describes agent’s properties, and different agent platforms.
• Quality of Service (QoS) provision: The issue of mobility
is interconnected to the issue of Quality of Service (QoS).
The long-term goal of the wireless grid is to provide the
same QoS to mobile users as experienced by wired users.
The inherent characteristics present in wireless networks
causes frequent disconnection and hence poor QoS.
General QoS parameters in realizing mobile wireless grids
include Latency, Error Rate, Bandwidth of the data in
transmission, Reliable and adaptable communication,
Secure authentications and privacy protections. The
provision of the QoS requirements for different
applications like healthcare emergency, natural disasters,
wildfire fighting, etc. is of crucial importance to avoid or
overcome the devastation.
IV. APPLICATIONS OF WIRELESS GRIDS
The increase in the capability/configuration of wireless
devices, reduction in the cost, and the craze of people have
made a drastic increase in the number of users making the
wireless devices a need of today’s life. However, the grids
potentiality is not explored yet; but, the aggregated resource
pool can offer a tremendous capacity so that any complex
application can be made possible to execute. Wireless grids
may support many applications in different areas [36], [37] as
mentioned below: Disaster management, mitigation and
response – includes applications like earthquakes, wildfire,
floods, tsunamis, etc.; Critical infrastructure systems –
includes condition monitoring and prediction of future
capability; Energy and environment – includes safe and
efficient power grids; Health – reliable and cost effective
health care systems with improved outcomes;
Enterprise-wide decision making - coordination of dynamic
distributed decisions for supply chains under uncertainty;
Some of the applications are briefed here:
• Disaster management: The natural disasters like
earthquake, flooding, volcanoes, Tsunami, wildfire fighting,
etc. cause a serious destruction. As a preservation measure
one can set up a sensor grid that consists of wireless sensors
and wired sensors [36]. The properly installed and
maintained sensor grid can provide an advance warning of
future disaster. The data-driven forest fire simulation
presented in [36], [37] predicts the behavior and spread of
wildfires along with detailed information of intensity,
propagation speed, and direction. The work considers both
dynamic and static environmental conditions.
• Health care services : Mobile ad hoc grids can be
deployed to provide healthcare services during emergency.
If a man is serious because of a road accident, temporary ad
hoc grid can be created using sensors (embedded at patient
body), mobile/PDA, or mobile devices that collaboratively
collect, distribute the data to central health care server
where it is processed, and obtain an instantaneous
suggestion on first aid or pre hospital treatments [14].
Hence it supports continuous monitoring of a patient. The
sensor grids deployed on the battlefield as a means of
detecting enemy troop movements by the vibrations as they
walk or drive through the unseen grid. Sensor networks are
currently in use monitoring environmental factors such as
temperature or humidity change, motion and light intensity.
• Emergency Response System: Integrated wireless phone
based emergency response system is presented in [37]. It
helps in detecting abnormal patterns in mobile call activity
and its location. It initiates dynamic data driven simulations
to predict the evolution of abnormality, and initiates higher
resolution data collection in localities of interest.
Another emergency communication scenario could be
explained as below: Police can automatically transmit data
collected using the mobile devices in their patrol vehicles.
Ambulances can automatically send patient data to hospital
control centers. In this way, data from mobile devices can be
used to provide seamless and automatic transmission of
information to the people who need it most.
• Musical entertainment: Wireless grid can be used for
Musical entertainment. For example, the Wireless Grids
research team at Syracuse University is building DARC
(Distributed Ad Hoc Resource Coordination) application to
5. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
473
demonstrate ad hoc distributed resource sharing [38]. The
system lets devices with no prior knowledge of each other
collectively record and mix an audio signal such as a
concert, speech, lecture, or emergency event. The project
demonstrates the potential of wireless grids and distributed
ad hoc resource sharing to harness the combined ability of
mobile devices in social contexts outside the expected
environments for computing.
• Supply chain management: supply chain asset
monitoring application is proposed in [39]. Using the
sensor networks in supply chain management process, it
helps in optimizing customer service for customized orders.
It keeps track of expensive commodities. As the goods
carrier is unloaded, each item can be sensed and easily
located within the warehouse.
• Automobile industry: Ad hoc wireless grid technology is
being applied to automobile industry. These projects share
a common goal of developing a mobile wireless network
implementation that allows automobiles to form
peer-to-peer ad hoc connections in order to pass
information on traffic and weather conditions, emergency
situations, tracking of vehicles, the occurrence of traffic
accidents or the location of nearby points of interest [40].
The embedding of Bluetooth networking capabilities into
automobile systems has allowed these systems to link with
Bluetooth enabled smart phones to provide hands free
telephone capabilities.
V. TOOLS AND STANDARDS
Due to the distributed nature of resources in grids that
cover multiple administrative domains, grid resource
management cannot be optimally implemented using
traditional approaches. In order to investigate new grid
resource management systems, researchers utilize simulators
which allows them to efficiently evaluate new algorithms on
a large scale. Some of the grid related simulators are listed as
follows: Bricks [41], SimGrid [42], GridSim [43], GangSim
[44], and OptorSim [45]. Similarly, Grid eXplorer [46], and
MicroGrid [47] are the emulators.
Since grid computing is a relatively new area, still
common standards and specifications are not established.
They are in an early definition stage [48] or are just drafts.
Some of the existing standards are : Open Grid Services
Architecture (OGSA), Open Grid Services Infrastructure
(OGSI), Web Services Resource Framework (WSRF), Grid
Security Infrastructure (GSI), and Web Services Standards
like SOAP, WSDL, and UDDI.
To facilitate transparent access in complex grid
environment users or developers should conform to standards
established by grid development communities. The work in
[49] presents some grid standards establishing bodies :
Global Grid Forum (GGF), World Wide Web Consortium
(W3C), OASIS, Distributed Management Task Force
(DMTF), and Web Services Interoperability Organization
(WS-I), etc.
VI. CONCLUSION
Grid Computing is a concept, a network, a work in
progress, part hype and part reality, and it is increasingly
capturing the attention of the computing community. The
idea of sharing the idle resources through the grid leads to
tremendous computing and storage pool, which gives even
the resource constrained wireless devices the power of
complex task execution. Grid Computing will be the major
area of focus in the future days. We may have Gridnet in the
future as we have Internet today.
Due to mobile nature of wireless devices and limitations of
wireless communications a number of unique challenges
must be overcome when building a grid application for
wireless devices. Many research works have been done in
wireless grid computing to address different issues, but still it
has to reach its maturity level by implementing various
commercial and industrial applications in different fields.
Mostly sensor grids are of more interest in most of
applications like patient health monitoring system, wild fire
monitoring system, tsunami prediction system, supply chain
management system, and others. Future researches may
consider enhancement of secured communication and
economic models in wireless resource sharing so that
accessing is facilitated by usage charges.
REFERENCES
[1] I. Foster, C. Kesselman, and S. Tuecke, The anatomy of the grid,
enabling scalable virtual organization , International Journal on
Supercomputer Applications, vol. 15, no. 3, 2001.
[2] I. Foster, C. Kesselman, J. M. Nick, and S. Tuecke, The physiology of
the grid, an open grid services architecture for distributed systems
integration , Open Grid Service Infrastructure WG, Global Grid Forum,
June 2002.
[3] Pin Hu, Lingfen Sun and Emmanuel Ifeachor, An Approach to
Structured Knowledge Representation of Service-oriented Grids.
[4] Lingfen Sun and Emmanuel C. Ifeachor, The impact of grid on
healthcare.
[5] M. N. Birje, S. S. Manvi, Bhanuprasad, Agent Based Resource
Discovery and Allocation in wireless Grids, International journal of
Multi Agents and Grid Systems, ,2006, Vol. 2 , IOS Press.
[6] D. Becker, Wi-Fi takes over in homes,
http://news.com.com/Wi-Fitakesoverinhomes/2100-1010, Jan. 20,
2005.
[7] Sanjay P. Ahuja, Jack R. Myers, A Survey on Wireless Grid Computing,
The Journal of Supercomputing, 37, 321, 2006.
[8] Heba Kurdi, Maozhen Li, and Hamed Al-Raweshidy, A Classification
of Emerging and Traditional Grid Systems, IEEE Distributed Systems
Online, vol. 9, no. 3, 2008, art. no. 0803-3001.
[9] T. Phan, L. Huang, and C. Dulan, Challenge: Integrating Mobile
Wireless Devices into the Computational Grid, Proc. 8th ACM Ann.
Intl Conf. Mobile Computing and Networking, ACM Press, 2002, pp.
271278.
[10] K. Ohta et al., Design and Implementation of Mobile Grid Middleware
for Handsets, Proc. of 11th Intl. Conf. Parallel and Distributed Systems
(ICPADS 05) ,IEEE CS Press, 2005, pp. 679683.
[11] L. S. Lima et al., Peer-to-Peer Resource Discovery in Mobile Grids,
Proc. 3rd Intl Workshop Middleware for Grid Computing (MGC
05) ,ACM Press, 2005, pp. 16
[12] S. Kurkovsky, Bhagyavati, and A. Ray, Modeling a Grid-Based
Problem-Solving Environment for Mobile Devices, J. Digital
Information Management, vol. 2, no. 2, 2004, pp. 109114.
[13] S. Kurkovsky, Bhagyavati, and A. Ray, A collaborative problem
solving framework for mobile devices.
[14] Z. Li, L.Sun and E. C. Ifeachor, Challenges of Mobile Ad-hoc Grids
and their Applications in e-Healthcare, Proc. of the 2nd Intl.
Conference on Computational Intelligence in Medicine and Healthcare
(CIMED’ 2005) ,July 2005, Lisbon, Portugal
[15] G. Xing, C. Lu, R. Pless, and Q. Huang, On greedy geographic routing
algorithms in sensing covered networks, Proceedings of the 5th ACM
international symposium on Mobile ad hoc networking and
computing ,May 2004.
6. International Journal of Computer and Electrical Engineering, Vol. 2, No. 3, June, 2010
1793-8163
474
[16] M. Miller. and N. Vaidya, Power save mechanisms for multi-hop
wireless networks, Proceedings of the First International Conference on
Broadband Networks (BROADNETS04),Oct. 2004
[17] M. Kanellos, Sensors drafted to turn off lights nationwide,
http://earthlink.com.com/Sensors drafted to turn off lights
nationwide/2100-1008 , 5563775.html, Feb. 4, 2005
[18] A. Gilbert, Hewlett-Packard to accelerate ID tagging,
http://earthlink.com.com/Hewlett-Packard to accelerate ID
tagging/2100-1039 3-5537125.html. Jan. 14, 2005
[19] Monitoring and discovery system, Available:
http://www.globus.org/toolkit/mds/.
[20] Sergio Andreozzi, Natascia De Bortoli, Sergio Fantinel, Antonia
Ghiselli, Gian Luca Rubini, Gennaro Tortone, Maria Cristina Vistoli,
GridICE:A monitoring service for Grid systems, Future Generation
Computer Systems 21 (4), pp. 559571, 2005
[21] S. S. Manvi, M. N. Birje, Device Resource Monitoring System in
Wireless Grids, accepted in ACEEE intl. conference on Advances in
Computing, Control & Telecommunication Technologies (ACT 2009),
Dec 28-29, 2009, Kerala, INDIA, Submitted for publication.
[22] Wu-Chun Chung, Ruay-Shiung Chang , A new mechanism for resource
monitoring in Grid computing, Intl journal of Future Generation
Computer Systems, 25, pp. 17, 2009
[23] Ling Huang, Minos Garofalakis, Joseph Hellerstein, Anthony Joseph,
Nina Taft, Toward Sophisticated Detection With Distributed Triggers,
SIGCOMM06 Workshops , Pisa, Italy, September 11-15, 2006
[24] Huang, L., Garofalakis, M., Joseph, A. and Taft, N. Communication
efficient tracking of distributed triggers, Tech. rep., February 2006
[25] Keralapura. R., Cormode. G., and Ramamirtham. J., Communication
efficient distributed monitoring of threshold counts, ACM SIGMOD,
2006
[26] Bhagyavati and S. Kurkovsky, Emerging Issues in Wireless
Computational Grids for Mobile Devices, Proc. 8th World Multiconf.
Systemics, Cybernetics, and Informatics (SCI-2004) ,2004,
www.cs.ccsu.edu/ stan/research/Grid/Pubs/SCI2004.pdf
[27] K. Krauter, R. Buyya, and M. Maheswaran, A Taxonomy and Survey of
Grid Resource Management Systems for Distributed Computing,
Software: Practice and Experience (SPE), vol. 32,, no. 2, pp. 135–164,
Feb. 2002
[28] A. Litke, D. Skoutas, and T. Varvarigou, mobile grid computing:
Changes and Challenges of resource management in a mobile grid
environment, Proc. of Practical Aspects of Knowledge Management
(PAKM 2004),Austria, December 2004
[29] Daniel M. Batista and Nelson L. S. da Fonseca, A Brief Survey on
Resource Allocation in Service Oriented Grids.
[30] W. Ye, J. Heidemann, and D. Estrin., An energy efficient mac protocol
for wireless sensor networks, Proceedings of 21st International Annual
Joint Conference of the IEEE Computer and Communications Societies
(INFOCOM 2002) , pp. 1567-1576. New York, June 2002
[31] Joe Polastre, Jason Hill, and David Culler, Versatile low power media
access for wireless sensor networks, Proceedings of Second ACM
Conference on Embedded Networked Sensor Systems (SenSys
2004) ,pp. 95-107, Baltimore, November 3-5, 2004
[32] D. C. Marinescuand Gabriela M. Marinescuand, Yongchang Ji, L.
Boloni, and H. J. Siegel, Ad hoc grids: Communication and computing
in a power constrained environment, Workshop on Energy-Efficient
Wireless Communications and Networks (EWCN),Phoenix, USA,
2003
[33] M. Li, Baker, The grid computing : The core technologies, Wiley
publishers, 2005
[34] S. S. Manvi, and P. Venkataram, Applications of agent technology in
communications: A review, Computer Communications, Vol. 27 ,
pp.1493-1508, 2004
[35] Wen-Shyen E. Chen, and Chih-Lin Hu, A mobile agent based
architecture for intelligent network control Information sciences, Vol.
141, pp 3-35, 2002
[36] J. yang, H, Chen, S. Hariri and M. Parashar, Self-optimizing of large
scale wild-fire simulations, Proc. Of 5th intl. conference on
Computational Sciences (ICCS 2005), Atlanta, GA, USA,
Springer-Verlag, May 2005
[37] Manish Parashar, Autonomic Grid Computing: Concepts,
Infrastructure and Applications, eScience 2007, IISc, Bangalore
[38] L. McKnight, J. Howison, and S. Bradner, Distributed resource
sharing by mobile, nomadic, and fixed devices, IEEE Internet
Computing, Aug 2004, Available:
[http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1315560isnum
ber=29152]
[39] Gaynor, Mark, Moulton, Steven, Integrating Wireless Sensor Nets
with the Grid , IEEE Internet Computing, July-August 2004
[40] M. Gerla, G. Pau, et al., Mesh meets ad hoc: the urban vehicular grid,
http://www.cs.ucla.edu/ST/12/2004
[41] http://ninf.apgrid.org/bricks/contents/hpdc99.html
[42] http://navet.ics.hawaii.edu/casanova/homepage/papers/simgrid
ccgrid03.pdf
[43] http://www.gridbus.org/papers/gridsim.pdf
[44] http://people.cs.uchicago.edu/ cldumitr/docs/GangSim.pdf
[45] www.gridpp.ac.uk/papers/chep04 optorsim.pdf
[46] http://www.logos.ic.i.u-tokyo.ac.jp/phoenix/papers/taura-swopp04-gx
p.pdf
[47] http://www-csag.ucsd.edu/projects/grid/microgrid.html
[48] http://hirlam.org/publications/NewsLetters/48/72-GCa-rep.pdf
[49] Mark Baker, Amy Apon, Clayton Ferner, Jeff Brown, Emerging Grid
Standards, IEEE Computer Society , April 2005
SUNILKUMAR. S MANVI received M.E. degree in
Electronics from the University of Visvesvaraya
College of Engineering, Bangalore, PhD degree in
Electrical Communication Engineering, Indian
Institute of Science, Bangalore, India. He is currently
working as a Professor and Head of Wireless
Information Systems Research Laboratory, and
Department of Electronics and Communication
Engineering, REVA Institute of Technology and
Management, Bangalore, India. He is involved in research of Agent based
applications in Multimedia Communications, Grid computing, Ad-hoc
networks, E-commerce and Mobile computing. Dr. Manvi has published 3
books, 3 book chapters, 25 refereed journal papers, and about 75 refereed
conference papers. He has given many invited lectures and has conducted
several workshops/seminars/conferences. He is the member/fellow of IEEE
(USA), IETE (INDIA), IE (INDIA), and ISTE (INDIA).
MAHANTESH N. BIRJE received B.E. in CSE
from UBDT college of Engineering-Davangere, in
1997, M.Tech. in Computer Science and
Engineering from Basaveshwar Engineering College,
Bagalkot, Karnataka, in 2005. Currently he is a
research scholar at Visvesvaraya Technological
University, Belgaum, under the guidance of Dr. S. S.
Manvi. He is currently working as Asst. Professor in
the Department of Information Science and
Engineering, Basaveshwar Engineering College, Bagalkot, Karnataka,
INDIA. His area of interest include Multimedia Communications, Grid
computing, and Agent technology. He has published 2 refereed journal
papers, and 7 refereed conference papers.