SlideShare a Scribd company logo
1 of 11
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN 
DISRUPTION TOLERANT NETWORKS 
ABSTRACT 
Disruption tolerant networks (DTNs) are characterized by low node density, 
unpredictable node mobility, and lack of global network information. Most of 
current research efforts in DTNs focus on data forwarding, but only limited work 
has been done on providing efficient data access to mobile users. A novel approach 
is proposed to support cooperative caching in DTNs, which enables the sharing and 
coordination of cached data among multiple nodes and reduces data access delay. 
The basic idea is to intentionally cache data at a set of network central locations 
(NCLs), which can be easily accessed by other nodes in the network. To propose 
an efficient scheme that ensures appropriate NCL selection based on a probabilistic 
selection metric and coordinates multiple caching nodes to optimize the tradeoff 
between data accessibility and caching overhead. Extensive trace-driven 
simulations show that this approach significantly improves data access 
performance compared to existing schemes.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
OBJECTIVE OF STUDY 
Objective is to efficiently support cooperative caching in DTNs. For this, to 
propose a method to cache data at a set of network central locations (NCLs), each 
of which corresponds to a group of mobile nodes being easily accessed by other 
nodes in the network. To ensure that popular data are always cached nearer to the 
central nodes via dynamic cache replacement based on query history. To propose a 
data access scheme to probabilistically coordinate multiple caching nodes for 
responding to user queries. 
INTRODUCTION 
Disruption tolerant networks (DTNs) consist of mobile devices that contact each 
other opportunistically. Due to the low node density and unpredictable node 
mobility, only intermittent network connectivity exists in DTNs, and the 
subsequent difficulty of maintaining end-to end communication links makes it 
necessary to use “carry and- forward” methods for data transmission. Examples of 
such networks include groups of individuals moving in disaster recovery areas, 
military battlefields, or urban sensing applications. In such networks, node 
mobility is exploited to let mobile nodes carry data as relays and forward data 
opportunistically when contacting others. The key problem is, therefore, how to 
determine the appropriate relay selection strategy. 
Although forwarding schemes have been proposed in DTNs, there is limited 
research on providing efficient data access to mobile users, despite the importance
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
of data accessibility in many mobile applications. For example, it is desirable that 
smart phone users can find interesting digital content from their nearby peers. In 
vehicular ad-hoc networks (VANETs), the availability of live traffic information 
will be beneficial for vehicles to avoid traffic delays. In these applications, data are 
only requested by mobile users whenever needed, and requesters do not know data 
locations in advance. The destination of data is, hence, unknown when data are 
generated. This communication paradigm differs from publish/subscribe systems in 
which data are forwarded by broker nodes to users according to their data 
subscriptions. Appropriate network design is needed to ensure that data can be 
promptly accessed by requesters in such cases. 
PROBLEM STATEMENT 
A common technique used to improve data access performance is caching, i.e., to 
cache data at appropriate network locations based on query history, so that queries 
in the future can be responded with less delay. Although cooperative caching has 
been studied for both web-based applications and wireless ad hoc networks to 
allow sharing and coordination among multiple caching nodes, it is difficult to be 
realized in DTNs due to the lack of persistent network connectivity. First, the 
opportunistic network connectivity complicates the estimation of data transmission 
delay, and furthermore makes it difficult to determine appropriate caching 
locations for reducing data access delay. This difficulty is also raised by the 
incomplete information at individual nodes about query history. Second, due to the 
uncertainty of data transmission, multiple data copies need to be cached at different
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
locations to ensure data accessibility. The difficulty in coordinating multiple 
caching nodes makes it hard to optimize the tradeoff between data accessibility and 
caching overhead. 
PROBLEM SOLUTION 
A novel scheme to be proposed address the aforementioned challenges and to 
efficiently support cooperative caching in DTNs. Intentionally cache data at a set 
of network central locations (NCLs), each of which corresponds to a group of 
mobile nodes being easily accessed by other nodes in the network. Each NCL is 
represented by a central node, which has high popularity in the network and is 
prioritized for caching data. Due to the limited caching buffer of central nodes, 
multiple nodes near a central node may be involved for caching, and it ensures that 
popular data are always cached nearer to the central nodes via dynamic cache 
replacement based on query history. To develop an efficient approach to NCL 
selection in DTNs based on a probabilistic selection metric. The selected NCLs 
achieve high chances for prompt response to user queries with low overhead in 
network storage and transmission. To propose a data access scheme to 
probabilistically coordinate multiple caching nodes for responding to user queries.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
EXISTING SYSTEM 
 Data forwarding in DTNs originates from Epidemic routing, which floods 
the entire network. 
 Efficient relay selection metrics were proposed to approach the performance 
of Epidemic routing with lower forwarding cost, based on prediction of node 
contacts in the future. 
 The social network properties of node contact patterns, such as the centrality 
and community structures, have also been also exploited for relay selection 
in recent social-based data forwarding schemes. 
 Compare-and-Forward method is used, where a relay forwards data to 
another node whose metric value is higher than itself. 
 Delegation forwarding reduces forwarding cost by only forwarding data to 
nodes with the highest metric. 
 Data access in DTNs, provided in various ways, data can be disseminated to 
appropriate users based on their interest profiles. Publish/ subscribe systems 
were used for data dissemination, where social community structures are 
usually exploited to determine broker nodes. 
 Caching is another way to provide data access. Cooperative caching in 
wireless ad hoc networks was studied, in which each node caches pass-by
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
data based on data popularity, so that queries in the future can be responded 
with less delay. 
Disadvantages 
 Always keeps a single data copy and Spray-and-Wait holds a fixed number 
of data copies, most schemes dynamically determine the number of data 
copies. 
 Under cooperative caching, Peer-to-peer data sharing and access among 
mobile users are generally neglected. 
PROPOSED SYSTEM 
 To propose a novel scheme to address the aforementioned challenges and to 
efficiently support cooperative caching in DTNs. 
 Intentionally cache data at a set of network central locations (NCLs), each of 
which corresponds to a group of mobile nodes being easily accessed by 
other nodes in the network. 
 Each NCL is represented by a central node, which has high popularity in the 
network and is prioritized for caching data. 
 Due to the limited caching buffer of central nodes, multiple nodes near a 
central node may be involved for caching, and it ensures that popular data
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
are always cached nearer to the central nodes via dynamic cache 
replacement based on query history. 
 To develop an efficient approach to NCL selection in DTNs based on a 
probabilistic selection metric. The selected NCLs achieve high chances for 
prompt response to user queries with low overhead in network storage and 
transmission. 
 To propose a data access scheme to probabilistically coordinate multiple 
caching nodes for responding to user queries. 
 To propose a utility-based cache replacement scheme to dynamically adjust 
cache locations based on query history 
Advantages 
 Optimize the tradeoff between data accessibility and caching overhead, to 
minimize the average number of cached data copies in the network. 
 Achieves good tradeoff between the data accessibility and access delay. 
LITERATURE SUMMARY 
Research on data forwarding in DTNs originates from Epidemic routing, which 
floods the entire network. Some later studies focus on proposing efficient relay 
selection metrics to approach the performance of Epidemic routing with lower 
forwarding cost, based on prediction of node contacts in the future. Some schemes
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
do such prediction based on their mobility patterns, which are characterized by 
Kalman filter or semi-Markov chains. 
In some other schemes, node contact pattern is exploited as abstraction of node 
mobility pattern for better prediction accuracy, based on the experimental and 
theoretical analysis of the node contact characteristics. The social network 
properties of node contact patterns, such as the centrality and community 
structures, have also been also exploited for relay selection in recent social-based 
data forwarding schemes. The aforementioned metrics for relay selection can be 
applied to various forwarding strategies, which differ in the number of data copies 
created in the network. While the most conservative strategy always keeps a single 
data copy and Spray-and-Wait holds a fixed number of data copies, most schemes 
dynamically determine the number of data copies. 
In Compare-and-Forward, a relay forwards data to another node whose metric 
value is higher than itself. Delegation forwarding reduces forwarding cost by only 
forwarding data to nodes with the highest metric. Data access in DTNs, on the 
other hand, can be provided in various ways. Data can be disseminated to 
appropriate users based on their interest profiles. 
Publish/ subscribe systems were used for data dissemination, where social 
community structures are usually exploited to determine broker nodes. In other 
schemes without brokers, data items are grouped into predefined channels, and are 
disseminated based on users’ subscriptions to these channels. Caching is another
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
way to provide data access. Cooperative caching in wireless ad hoc networks was 
studied, in which each node caches pass-by data based on data popularity, so that 
queries in the future can be responded with less delay. Caching locations are 
selected incidentally among all the network nodes. 
Some research efforts have been made for caching in DTNs, but they only improve 
data accessibility from infrastructure network such as WiFi access points (APs) or 
Internet. Peer-to-peer data sharing and access among mobile users are generally 
neglected. Distributed determination of caching policies for minimizing data 
access delay has been studied in DTNs, assuming simplified network conditions. 
It is assumed that all the nodes contact each other with the same rate. Users are 
artificially partitioned into several classes such that users in the same class are 
identical. Data are intentionally cached at appropriate network locations with 
generic data and query models, but these caching locations are determined based 
on global network knowledge.
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
HARDWARE REQUIREMENTS 
Processor : Any Processor above 500 MHz. 
Ram : 128Mb. 
Hard Disk : 10 Gb. 
Compact Disk : 650 Mb. 
Input device : Standard Keyboard and Mouse. 
Output device : VGA and High Resolution Monitor. 
SOFTWARE SPECIFICATION 
Operating System : Windows Family. 
Pages developed using : Java Swing 
Techniques : JDK 1.5 or higher 
Database : MySQL 5.0
LeMeniz Infotech 
36, 100 feet Road, Natesan 
Nagar(Near Indira Gandhi Statue, Next 
to Fish-O-Fish), Pondicherry-605 005 
Call: 0413-4205444, +91 99625 88976, 
95663 55386. 
Query Reply 
For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 
/9566355386 
Do Your Projects With Domain Experts 
SYSTEM ARCHITECTURE 
Node A Query 
Nearest 
NCL 
Server 
Allocate 
NCL 
Query Reply 
Cache 
memory 
Node Query 
NCL – Network Central Location

More Related Content

What's hot

BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESijwmn
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedNinad Samel
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...ijgca
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Spacencct
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 
Addressing the Challenges of Tactical Information Management in Net-Centric S...
Addressing the Challenges of Tactical Information Management in Net-Centric S...Addressing the Challenges of Tactical Information Management in Net-Centric S...
Addressing the Challenges of Tactical Information Management in Net-Centric S...Angelo Corsaro
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...amna alhabib
 
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...Tal Lavian Ph.D.
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET Journal
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESijcsit
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningEditor IJCATR
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageIaetsd Iaetsd
 
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGDISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGijgca
 
Design and implementation of a personal super Computer
Design and implementation of a personal super ComputerDesign and implementation of a personal super Computer
Design and implementation of a personal super Computerijcsit
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ijp2p
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET Journal
 

What's hot (18)

BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUESBIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
BIG DATA NETWORKING: REQUIREMENTS, ARCHITECTURE AND ISSUES
 
A hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorizedA hybrid cloud approach for secure authorized
A hybrid cloud approach for secure authorized
 
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
Java Abs   Peer To Peer Design & Implementation Of A Tuple SpaceJava Abs   Peer To Peer Design & Implementation Of A Tuple Space
Java Abs Peer To Peer Design & Implementation Of A Tuple Space
 
Dq36708711
Dq36708711Dq36708711
Dq36708711
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Addressing the Challenges of Tactical Information Management in Net-Centric S...
Addressing the Challenges of Tactical Information Management in Net-Centric S...Addressing the Challenges of Tactical Information Management in Net-Centric S...
Addressing the Challenges of Tactical Information Management in Net-Centric S...
 
A scalabl e and cost effective framework for privacy preservation over big d...
A  scalabl e and cost effective framework for privacy preservation over big d...A  scalabl e and cost effective framework for privacy preservation over big d...
A scalabl e and cost effective framework for privacy preservation over big d...
 
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...
DWDM-RAM: a data intensive Grid service architecture enabled by dynamic optic...
 
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain TechnologyIRJET- A Survey on File Storage and Retrieval using Blockchain Technology
IRJET- A Survey on File Storage and Retrieval using Blockchain Technology
 
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRESHYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
HYBRID OPTICAL AND ELECTRICAL NETWORK FLOWS SCHEDULING IN CLOUD DATA CENTRES
 
Agent-Driven Distributed Data Mining
Agent-Driven Distributed Data MiningAgent-Driven Distributed Data Mining
Agent-Driven Distributed Data Mining
 
iaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storageiaetsd Controlling data deuplication in cloud storage
iaetsd Controlling data deuplication in cloud storage
 
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTINGDISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
DISTRIBUTED AND BIG DATA STORAGE MANAGEMENT IN GRID COMPUTING
 
Design and implementation of a personal super Computer
Design and implementation of a personal super ComputerDesign and implementation of a personal super Computer
Design and implementation of a personal super Computer
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
ANALYSIS STUDY ON CACHING AND REPLICA PLACEMENT ALGORITHM FOR CONTENT DISTRIB...
 
IRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing FrameworkIRJET- Blockchain based Data Sharing Framework
IRJET- Blockchain based Data Sharing Framework
 

Viewers also liked

Windows vs linux parte 2 dalia y nalo
Windows vs linux parte 2 dalia y naloWindows vs linux parte 2 dalia y nalo
Windows vs linux parte 2 dalia y naloDalia Veliz
 
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...LeMeniz Infotech
 
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerWave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerUM Wave
 
Ten Modern Plagues - for Seder Discussion
Ten Modern Plagues - for Seder DiscussionTen Modern Plagues - for Seder Discussion
Ten Modern Plagues - for Seder DiscussionArnie Fertig
 
Lion opportunities plan BY AL AMIN
Lion opportunities plan BY  AL AMINLion opportunities plan BY  AL AMIN
Lion opportunities plan BY AL AMINAlamin Pathan
 
Retouched pictures
Retouched picturesRetouched pictures
Retouched picturesmdrouet44
 
10.6 MW Solar hybrid
10.6 MW Solar hybrid10.6 MW Solar hybrid
10.6 MW Solar hybridThe Solar Biz
 
Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .LeMeniz Infotech
 
My ppt game carlos suarez
My ppt game carlos suarezMy ppt game carlos suarez
My ppt game carlos suarezcarlos27748318
 
Sports, culture, and the media
Sports, culture, and the mediaSports, culture, and the media
Sports, culture, and the mediakellyjean11kk
 
UN on Climate Change
UN on Climate ChangeUN on Climate Change
UN on Climate ChangeThe Solar Biz
 
From Economic Brand Value to Holonomic Brand Value
From Economic Brand Value to Holonomic Brand ValueFrom Economic Brand Value to Holonomic Brand Value
From Economic Brand Value to Holonomic Brand ValueHolonomics
 
the problem with Unions
the problem with Unionsthe problem with Unions
the problem with UnionsThe Solar Biz
 

Viewers also liked (19)

Windows vs linux parte 2 dalia y nalo
Windows vs linux parte 2 dalia y naloWindows vs linux parte 2 dalia y nalo
Windows vs linux parte 2 dalia y nalo
 
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...A fast acquisition all-digital delay-locked loop using a starting-bit predict...
A fast acquisition all-digital delay-locked loop using a starting-bit predict...
 
Tecnología
Tecnología Tecnología
Tecnología
 
Costume
CostumeCostume
Costume
 
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media TrackerWave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
Wave 1 - Web 2.0 The Global Impact | UM | Social Media Tracker
 
Chikmagalur
ChikmagalurChikmagalur
Chikmagalur
 
Ten Modern Plagues - for Seder Discussion
Ten Modern Plagues - for Seder DiscussionTen Modern Plagues - for Seder Discussion
Ten Modern Plagues - for Seder Discussion
 
Lion opportunities plan BY AL AMIN
Lion opportunities plan BY  AL AMINLion opportunities plan BY  AL AMIN
Lion opportunities plan BY AL AMIN
 
Bikok T. Pierre
Bikok T. PierreBikok T. Pierre
Bikok T. Pierre
 
Retouched pictures
Retouched picturesRetouched pictures
Retouched pictures
 
10.6 MW Solar hybrid
10.6 MW Solar hybrid10.6 MW Solar hybrid
10.6 MW Solar hybrid
 
Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .Query aware determinization of uncertain objects .
Query aware determinization of uncertain objects .
 
My ppt game carlos suarez
My ppt game carlos suarezMy ppt game carlos suarez
My ppt game carlos suarez
 
Sports, culture, and the media
Sports, culture, and the mediaSports, culture, and the media
Sports, culture, and the media
 
UN on Climate Change
UN on Climate ChangeUN on Climate Change
UN on Climate Change
 
TEAM building
TEAM buildingTEAM building
TEAM building
 
Solar Panels
Solar PanelsSolar Panels
Solar Panels
 
From Economic Brand Value to Holonomic Brand Value
From Economic Brand Value to Holonomic Brand ValueFrom Economic Brand Value to Holonomic Brand Value
From Economic Brand Value to Holonomic Brand Value
 
the problem with Unions
the problem with Unionsthe problem with Unions
the problem with Unions
 

Similar to Cooperative caching for efficient data access in disruption tolerant networks

cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
 
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...
JPJ1448   Cooperative Caching for Efficient Data Access in Disruption Toleran...JPJ1448   Cooperative Caching for Efficient Data Access in Disruption Toleran...
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...chennaijp
 
Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access inShakas Technologies
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...cscpconf
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksijwmn
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloudLeMeniz Infotech
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...LeMeniz Infotech
 
An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...LeMeniz Infotech
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Video dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networksVideo dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networksLeMeniz Infotech
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesVenkat Projects
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...marwaeng
 
Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...LeMeniz Infotech
 
Data collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksData collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksLeMeniz Infotech
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netredpel dot com
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAmanda Brady
 

Similar to Cooperative caching for efficient data access in disruption tolerant networks (20)

cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...
JPJ1448   Cooperative Caching for Efficient Data Access in Disruption Toleran...JPJ1448   Cooperative Caching for Efficient Data Access in Disruption Toleran...
JPJ1448 Cooperative Caching for Efficient Data Access in Disruption Toleran...
 
Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access in
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networks
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
Oruta privacy preserving public auditing for shared data in the cloud
Oruta privacy  preserving public auditing for shared data in the cloudOruta privacy  preserving public auditing for shared data in the cloud
Oruta privacy preserving public auditing for shared data in the cloud
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...An incremental and distributed inference methodfor large scale ontologies bas...
An incremental and distributed inference methodfor large scale ontologies bas...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Video dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networksVideo dissemination over hybrid cellular and ad hoc networks
Video dissemination over hybrid cellular and ad hoc networks
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storages
 
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...Effects of power conservation, wireless coverage and cooperation on data diss...
Effects of power conservation, wireless coverage and cooperation on data diss...
 
Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...Dynamic routing for data integrity and delay differentiated services in wirel...
Dynamic routing for data integrity and delay differentiated services in wirel...
 
Data collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networksData collection multi application sharing wireless sensor networks
Data collection multi application sharing wireless sensor networks
 
Parallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot netParallel and distributed system projects for java and dot net
Parallel and distributed system projects for java and dot net
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 

More from LeMeniz Infotech

A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...LeMeniz Infotech
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...LeMeniz Infotech
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachLeMeniz Infotech
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsLeMeniz Infotech
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...LeMeniz Infotech
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlLeMeniz Infotech
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...LeMeniz Infotech
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...LeMeniz Infotech
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...LeMeniz Infotech
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...LeMeniz Infotech
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...LeMeniz Infotech
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersLeMeniz Infotech
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesLeMeniz Infotech
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedLeMeniz Infotech
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksLeMeniz Infotech
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsLeMeniz Infotech
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...LeMeniz Infotech
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android appsLeMeniz Infotech
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication schemeLeMeniz Infotech
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017LeMeniz Infotech
 

More from LeMeniz Infotech (20)

A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...A fast fault tolerant architecture for sauvola local image thresholding algor...
A fast fault tolerant architecture for sauvola local image thresholding algor...
 
A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...A dynamically reconfigurable multi asip architecture for multistandard and mu...
A dynamically reconfigurable multi asip architecture for multistandard and mu...
 
Interleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approachInterleaved digital power factor correction based on the sliding mode approach
Interleaved digital power factor correction based on the sliding mode approach
 
Bumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuitsBumpless control for reduced thd in power factor correction circuits
Bumpless control for reduced thd in power factor correction circuits
 
A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...A bidirectional single stage three phase rectifier with high-frequency isolat...
A bidirectional single stage three phase rectifier with high-frequency isolat...
 
A bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam controlA bidirectional three level llc resonant converter with pwam control
A bidirectional three level llc resonant converter with pwam control
 
Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...Efficient single phase transformerless inverter for grid tied pvg system with...
Efficient single phase transformerless inverter for grid tied pvg system with...
 
Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...Highly reliable transformerless photovoltaic inverters with leakage current a...
Highly reliable transformerless photovoltaic inverters with leakage current a...
 
Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...Grid current-feedback active damping for lcl resonance in grid-connected volt...
Grid current-feedback active damping for lcl resonance in grid-connected volt...
 
Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...Delay dependent stability of single-loop controlled grid-connected inverters ...
Delay dependent stability of single-loop controlled grid-connected inverters ...
 
Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...Connection of converters to a low and medium power dc network using an induct...
Connection of converters to a low and medium power dc network using an induct...
 
Stamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile usersStamp enabling privacy preserving location proofs for mobile users
Stamp enabling privacy preserving location proofs for mobile users
 
Sbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphonesSbvlc secure barcode based visible light communication for smartphones
Sbvlc secure barcode based visible light communication for smartphones
 
Read2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impairedRead2 me a cloud based reading aid for the visually impaired
Read2 me a cloud based reading aid for the visually impaired
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwordsPass byo bring your own picture for securing graphical passwords
Pass byo bring your own picture for securing graphical passwords
 
Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...Eplq efficient privacy preserving location-based query over outsourced encryp...
Eplq efficient privacy preserving location-based query over outsourced encryp...
 
Analyzing ad library updates in android apps
Analyzing ad library updates in android appsAnalyzing ad library updates in android apps
Analyzing ad library updates in android apps
 
An exploration of geographic authentication scheme
An exploration of geographic authentication schemeAn exploration of geographic authentication scheme
An exploration of geographic authentication scheme
 
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
Dotnet IEEE Projects 2016-2017 | Dotnet IEEE Projects Titles 2016-2017
 

Recently uploaded

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Cooperative caching for efficient data access in disruption tolerant networks

  • 1. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN DISRUPTION TOLERANT NETWORKS ABSTRACT Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. A novel approach is proposed to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. The basic idea is to intentionally cache data at a set of network central locations (NCLs), which can be easily accessed by other nodes in the network. To propose an efficient scheme that ensures appropriate NCL selection based on a probabilistic selection metric and coordinates multiple caching nodes to optimize the tradeoff between data accessibility and caching overhead. Extensive trace-driven simulations show that this approach significantly improves data access performance compared to existing schemes.
  • 2. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts OBJECTIVE OF STUDY Objective is to efficiently support cooperative caching in DTNs. For this, to propose a method to cache data at a set of network central locations (NCLs), each of which corresponds to a group of mobile nodes being easily accessed by other nodes in the network. To ensure that popular data are always cached nearer to the central nodes via dynamic cache replacement based on query history. To propose a data access scheme to probabilistically coordinate multiple caching nodes for responding to user queries. INTRODUCTION Disruption tolerant networks (DTNs) consist of mobile devices that contact each other opportunistically. Due to the low node density and unpredictable node mobility, only intermittent network connectivity exists in DTNs, and the subsequent difficulty of maintaining end-to end communication links makes it necessary to use “carry and- forward” methods for data transmission. Examples of such networks include groups of individuals moving in disaster recovery areas, military battlefields, or urban sensing applications. In such networks, node mobility is exploited to let mobile nodes carry data as relays and forward data opportunistically when contacting others. The key problem is, therefore, how to determine the appropriate relay selection strategy. Although forwarding schemes have been proposed in DTNs, there is limited research on providing efficient data access to mobile users, despite the importance
  • 3. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts of data accessibility in many mobile applications. For example, it is desirable that smart phone users can find interesting digital content from their nearby peers. In vehicular ad-hoc networks (VANETs), the availability of live traffic information will be beneficial for vehicles to avoid traffic delays. In these applications, data are only requested by mobile users whenever needed, and requesters do not know data locations in advance. The destination of data is, hence, unknown when data are generated. This communication paradigm differs from publish/subscribe systems in which data are forwarded by broker nodes to users according to their data subscriptions. Appropriate network design is needed to ensure that data can be promptly accessed by requesters in such cases. PROBLEM STATEMENT A common technique used to improve data access performance is caching, i.e., to cache data at appropriate network locations based on query history, so that queries in the future can be responded with less delay. Although cooperative caching has been studied for both web-based applications and wireless ad hoc networks to allow sharing and coordination among multiple caching nodes, it is difficult to be realized in DTNs due to the lack of persistent network connectivity. First, the opportunistic network connectivity complicates the estimation of data transmission delay, and furthermore makes it difficult to determine appropriate caching locations for reducing data access delay. This difficulty is also raised by the incomplete information at individual nodes about query history. Second, due to the uncertainty of data transmission, multiple data copies need to be cached at different
  • 4. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts locations to ensure data accessibility. The difficulty in coordinating multiple caching nodes makes it hard to optimize the tradeoff between data accessibility and caching overhead. PROBLEM SOLUTION A novel scheme to be proposed address the aforementioned challenges and to efficiently support cooperative caching in DTNs. Intentionally cache data at a set of network central locations (NCLs), each of which corresponds to a group of mobile nodes being easily accessed by other nodes in the network. Each NCL is represented by a central node, which has high popularity in the network and is prioritized for caching data. Due to the limited caching buffer of central nodes, multiple nodes near a central node may be involved for caching, and it ensures that popular data are always cached nearer to the central nodes via dynamic cache replacement based on query history. To develop an efficient approach to NCL selection in DTNs based on a probabilistic selection metric. The selected NCLs achieve high chances for prompt response to user queries with low overhead in network storage and transmission. To propose a data access scheme to probabilistically coordinate multiple caching nodes for responding to user queries.
  • 5. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts EXISTING SYSTEM  Data forwarding in DTNs originates from Epidemic routing, which floods the entire network.  Efficient relay selection metrics were proposed to approach the performance of Epidemic routing with lower forwarding cost, based on prediction of node contacts in the future.  The social network properties of node contact patterns, such as the centrality and community structures, have also been also exploited for relay selection in recent social-based data forwarding schemes.  Compare-and-Forward method is used, where a relay forwards data to another node whose metric value is higher than itself.  Delegation forwarding reduces forwarding cost by only forwarding data to nodes with the highest metric.  Data access in DTNs, provided in various ways, data can be disseminated to appropriate users based on their interest profiles. Publish/ subscribe systems were used for data dissemination, where social community structures are usually exploited to determine broker nodes.  Caching is another way to provide data access. Cooperative caching in wireless ad hoc networks was studied, in which each node caches pass-by
  • 6. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts data based on data popularity, so that queries in the future can be responded with less delay. Disadvantages  Always keeps a single data copy and Spray-and-Wait holds a fixed number of data copies, most schemes dynamically determine the number of data copies.  Under cooperative caching, Peer-to-peer data sharing and access among mobile users are generally neglected. PROPOSED SYSTEM  To propose a novel scheme to address the aforementioned challenges and to efficiently support cooperative caching in DTNs.  Intentionally cache data at a set of network central locations (NCLs), each of which corresponds to a group of mobile nodes being easily accessed by other nodes in the network.  Each NCL is represented by a central node, which has high popularity in the network and is prioritized for caching data.  Due to the limited caching buffer of central nodes, multiple nodes near a central node may be involved for caching, and it ensures that popular data
  • 7. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts are always cached nearer to the central nodes via dynamic cache replacement based on query history.  To develop an efficient approach to NCL selection in DTNs based on a probabilistic selection metric. The selected NCLs achieve high chances for prompt response to user queries with low overhead in network storage and transmission.  To propose a data access scheme to probabilistically coordinate multiple caching nodes for responding to user queries.  To propose a utility-based cache replacement scheme to dynamically adjust cache locations based on query history Advantages  Optimize the tradeoff between data accessibility and caching overhead, to minimize the average number of cached data copies in the network.  Achieves good tradeoff between the data accessibility and access delay. LITERATURE SUMMARY Research on data forwarding in DTNs originates from Epidemic routing, which floods the entire network. Some later studies focus on proposing efficient relay selection metrics to approach the performance of Epidemic routing with lower forwarding cost, based on prediction of node contacts in the future. Some schemes
  • 8. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts do such prediction based on their mobility patterns, which are characterized by Kalman filter or semi-Markov chains. In some other schemes, node contact pattern is exploited as abstraction of node mobility pattern for better prediction accuracy, based on the experimental and theoretical analysis of the node contact characteristics. The social network properties of node contact patterns, such as the centrality and community structures, have also been also exploited for relay selection in recent social-based data forwarding schemes. The aforementioned metrics for relay selection can be applied to various forwarding strategies, which differ in the number of data copies created in the network. While the most conservative strategy always keeps a single data copy and Spray-and-Wait holds a fixed number of data copies, most schemes dynamically determine the number of data copies. In Compare-and-Forward, a relay forwards data to another node whose metric value is higher than itself. Delegation forwarding reduces forwarding cost by only forwarding data to nodes with the highest metric. Data access in DTNs, on the other hand, can be provided in various ways. Data can be disseminated to appropriate users based on their interest profiles. Publish/ subscribe systems were used for data dissemination, where social community structures are usually exploited to determine broker nodes. In other schemes without brokers, data items are grouped into predefined channels, and are disseminated based on users’ subscriptions to these channels. Caching is another
  • 9. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts way to provide data access. Cooperative caching in wireless ad hoc networks was studied, in which each node caches pass-by data based on data popularity, so that queries in the future can be responded with less delay. Caching locations are selected incidentally among all the network nodes. Some research efforts have been made for caching in DTNs, but they only improve data accessibility from infrastructure network such as WiFi access points (APs) or Internet. Peer-to-peer data sharing and access among mobile users are generally neglected. Distributed determination of caching policies for minimizing data access delay has been studied in DTNs, assuming simplified network conditions. It is assumed that all the nodes contact each other with the same rate. Users are artificially partitioned into several classes such that users in the same class are identical. Data are intentionally cached at appropriate network locations with generic data and query models, but these caching locations are determined based on global network knowledge.
  • 10. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts HARDWARE REQUIREMENTS Processor : Any Processor above 500 MHz. Ram : 128Mb. Hard Disk : 10 Gb. Compact Disk : 650 Mb. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution Monitor. SOFTWARE SPECIFICATION Operating System : Windows Family. Pages developed using : Java Swing Techniques : JDK 1.5 or higher Database : MySQL 5.0
  • 11. LeMeniz Infotech 36, 100 feet Road, Natesan Nagar(Near Indira Gandhi Statue, Next to Fish-O-Fish), Pondicherry-605 005 Call: 0413-4205444, +91 99625 88976, 95663 55386. Query Reply For More Projects Titles Visits : www.lemenizinfotech.com | Call Us : 9962588976 /9566355386 Do Your Projects With Domain Experts SYSTEM ARCHITECTURE Node A Query Nearest NCL Server Allocate NCL Query Reply Cache memory Node Query NCL – Network Central Location