SlideShare a Scribd company logo
1 of 5
Download to read offline
International Refereed Journal of Engineering and Science (IRJES)
ISSN (Online) 2319-183X, (Print) 2319-1821
Volume 2, Issue 10 (October 2013), PP. 56-60

A Co-Operative Cluster Based Data Replication Technique for
Improving Data Accessibility and Reducing Query Delay in
Manet’s
K.Priyatharshini1, Rajanandhini.P2
1

Computer Science/Sri Krishna Arts and Science/Bharathiyar/India
Computer Application and Software System/Sri Krishna Arts and Science/Bharathiyar/India

2

Abstract:- MANETs are very popular because of its infrastructure less network. These mobile nodes serve as
both hosts and routers so they can forward packets on behalf of each other. It has restricted computing
resources and due to mobility of node there is much change in network topology. These restrictions raise several
new challenges for data access applications with the respects of data availability and access delay. This result in
lower data availability in mobile ad-hoc networks than in wired networks. One probable solution to avoid this
problem is to take up replication techniques which increases data availability and decrease query response delay.
The replication process duplicates and preserves the consistency of multiple copies of objects in different sites
so that each client node can visit a local copy of an object instead of remote ones. In this way replication can
considerably enhances a distributed system's availability, reliability and scalability. It replicates the recurrently
used data that rely on neighbour’s memory when the connection among them is secure. The experimental result
depicts that higher degree of data accessibility enhances the query delay also. So the proposed work is to
enhance the data availability and decrease the query delay in the MANET. The proposed system deals with a
better replication management technique for MANETs known as cluster related data replication technique to
make available the needed data items from the neighbours node and able to choose which data items can be
replicated at a node. After that there should be an effective replica restore algorithm to change the old copy of
data items when change is required in the original copy of the data item. The results proved that proposed
approach is much more efficient than the existing techniques.
Keywords:- Clusters, cooperative, data availability, Datareplication, MobileAd-Hocnetworks, Query delay.

I.

INTRODUCTION

In mobile ad hoc networks (MANETs), mobile nodes are in motion freely, network split-up may occur,
where nodes in one partition cannot access data held by nodes in other partitions. Mobile adhoc networks
considerably decrease the performance of data access. To solve this problem here data replication techniques
will be used .Data replication can decrease the query delay due to the mobile nodes can get the data from some
nearby replicas.
Data replication solutions in both wired and wireless networks aim at either reducing the query delay or
improving the data availability. But the both metrics are important to the mobile nodes. In a MANET mobile
nodes collaboratively share data. Multiple nodes exist in the networks and they send query requests to other
nodes for some particular data items. Each node makes replicas of the data items and maintains the replicas in
its memory (or disk) space.
During data replication, there is no central server that determines the distribution of replicas, and
mobile nodes determine the data allocation in a distributed manner. Replicating most data locally can reduce
the query delay, but it reduces the data availability due to many nodes may end up replicating the same data
locally while other data items are not replicated by anyone.
To increase the data accessibility, nodes should not replicate the data that neighbouring nodes already
have it on its memory. Though, several mobile nodes only have restricted memory space, bandwidth, and power,
and hence it is impracticable for one node to bring together and maintaining all the data considering these facts.
Queries generated during network partition may fail because the requested data items are not available in the
partition to which the client belongs. Each node preserves a few quantities of data locally and the node is called
the original owner of the data. To improve the data accessibility, these data items may be replicated to other
nodes. The new data replication techniques are used to trade off between the query delay and data availability in
MANET.
This improves the data availability in the MANET using data replication. Data replication is the
process of sharing information between the mobile nodes and ensures the consistency between the resources.

www.irjes.com

56 | Page
A Co-Operative Cluster Based Data Replication Technique for Improving Data…
In MANET sharing information is not easy task because all the nodes the data saved at other nodes
may not be accessible. The new data replication technique increases the performance level and address the query
delay problem.

II.

COOPERATIVE DATA REPLICATION

In cooperative data replication, a node cooperates with each other and shares their memory space for
replicating data for neighboring nodes. Among several nodes from a network one may send requests to other
nodes for some specific data items. Here every node creates and maintains replica’s in its memory.
In cooperative data replication one node my allocate memory space for replicating data of their
neighboring nodes data. So this way the degree of cooperation among mobile nodes will be maintained.
2.1 One to One Data Replication
In this approach each mobile node will cooperates at most one neighbor to decide data for replication.
Among multiple available neighboring nodes it selects one node based on priority value for data replication.
Consider node N1 and N2 are neighboring nodes. a1d and a2d be the access frequency for data d from node N1 and
N2 respectively. Here each node computes cumulative access frequency to the data item d.
For N1 to d
CAF12d = (a1d+a2d × (1- f12) / s) --(1)
For N2 to d
CAF21d = (a2d+a1d × (1- f12) / s) –(2)
So the priority value for node as follows
P12d = CAF12d × f12 ……if replication is done at N1
P12d = CAF12d
……if replication is not done at N1
Therefore here every node considers high priority value data for making replication process.
2.2 Reliable Neighbor Data Replication
In OTOO scheme, choice of choosing neighboring node is based access frequency while making
replication. So it may reduce the degree of cooperation as such minimal. To increase the cooperation level, in
reliable neighbor scheme node allocates more memory for replicating data for neighbors.
For the node N1, N2 to be a reliable neighbor
If 1 – f12 > ῖ (threshold)
---- (3)
For a each node the allocated memory for replicating neighboring nodes data
Callocate = C × min (1, for all reliable neighbors (1-f) / α)
------(4)
In this scheme, the node makes replication of its available data up to the C - Callocate. Then priority value is
calculated for the node to the data item. Here the allocated memory is reserved for the data item with high
priority value.
2.3 Reliable Grouping Replication
Here the OTOO considers only one neighbor and reliable neighbor chooses all one hop neighbors. But
here to add more cooperation in RG scheme, the replicas of data will be shared among large reliable groups. So
we can preserve a perfect cooperation between nodes. Initially all nodes transmits their ids and access frequency
to all data items.
Here set of bi-connected nodes considered to be linked if and only they have a consistent link i.e.
1 – f12 > ῖ (threshold)
Then each set will be put into a group to form a reliable group. The average access probability of all data item is
calculated using the following
Pd =

-----(5)

The demand weighted access delay if replica of data d will be maintained at N 2,
T2d = ∑ai ×t12 × sd
-------(6)
Select the node with high Pd to replicate the data in which node selection minimizes the delay access in the
group.
i.e., T1d = min {Tnd} for all node Nn € group. So here the allocation process is repeated until the entire data item
is replicated.
2.4 Replica Management Using Clusters
With all the nodes having the reliable links cluster is formed by using the LCC algorithm. When a node
requires some data item it sends request to cluster head. When a node receives a data item it replicate the data
item locally for future use.

www.irjes.com

57 | Page
A Co-Operative Cluster Based Data Replication Technique for Improving Data…
Each mobile node is associated with a cluster and refers to the set of nodes that can be reached by the
node within the given number of hops. Every cluster has its cluster head (CH). Each cluster head will maintain a
table Replica Table (RT) and replica index (RI). This RT will contain the information about the replicas that are
available with different node in that cluster. There will be 3 entries related to each node: node-id, item-id, spaceavailable. The RI contains node id, data size and TTL value.
When a mobile node needs a new data item then first it will check whether the data item is locally
available or not. If yes then data item is get back to the requester and if not the request forwarded to the CH.
Now CH will check the item-id in RT to see whether the data item is available in the cluster. If any matched
entry is found the request is redirected to that node pertaining to that item-id.
Otherwise CH will request that data item to other CHs if data is found then request forwarding is
stopped and data is returned to the requester. When a node receives a data item then, it will make a replica of it
for upcoming use. And an update message is send to its CH. In the process of returning the data item to the
client node, a node in underlying path, if it is a CH, then it start replication process (RP).
In RP, initially cluster head will get the size of the data item whose replica needs to be created in that
cluster. Now cluster head will check its RT and check for a node with free space available greater than the size
of data item di. Now if CH gets a node with space-available greater than or equals to the size data item, then CH
replicate the data item on that node.
After replicating data item on that node, node will send a message to the CH so that CH will update its
entries related to that node in RT. Now if CH fails to get a node with space-available greater than or equals to
the size data item, then CH will choose a node with maximum free space available. After selecting node CH
redirect that node to call a procedure (MCR (NK, S)) to create enough space to replicate that data item on that
node.
In this process the node will remove some data items. Decision of removing the data items at a node
will be based upon the Replacement Policy. After successful creation of free space at that node, CH will
replicating that data item on that node, node will send a message to the CH so that CH will update its entries
related to that node in RT. After updating its RT, the CH will send this update that item is found then this update
is discard otherwise CH will choose a mobile node where the replica of that item can be made. The node with
maximum available free space will be selected.

III.

SIMULATION RESULTS

Here NS2 is used to stimulate the replica allocation and maintenance using clusters. The mobile adhoc
network considered as an undirected graph G (V, E) in which it contains 30 mobile nodes for simulation using a
random waypoint model. It contains n data items which are disseminated in the network. For simplicity all data
items are in unit size. Here each mobile node can only replicate (C < number of nodes). Here the following
figures represent data availability and query delay simulation results as a graph. The reliable link is fully resided
on link failure probability. Finding link failure probability is quite difficult and for simplicity we assume that it
is based on signal strength.

IV.

FIGURES

www.irjes.com

58 | Page
A Co-Operative Cluster Based Data Replication Technique for Improving Data…
Fig.1 Replica Management Using Clustered Approach

Fig.2 Data Availability

Fig.3 Query Delay

V.

CONCLUSION

Network partitions are common due to link failure in MANETs. As a result data saved at other nodes
may not be available. One way to improve data availability is through data replication. The proposed several
data replication schemes improve the data availability and reduce the query delay. The perfect idea is to
replicate the most frequently accessed data locally and only rely on neighbour’s memory when the
communication link to them is reliable. The proposed replication management technique for MANETs proved
efficient to deliver requested data items from the neighbours node and capable to decide which data items can be
replicated at a node. Also using cluster based replica allocation of data will make an effective trade-off between
query delay and data availability in MANET’s.

REFERENCES
[1].
[2].
[3].
[4].
[5].
[6].

B. Tang, H. Gupta, and S. Das, “Benefit-Based Data Caching in Ad Hoc Networks,” IEEE Trans.
Mobile Computing, vol. 7, no. 3,pp. 289-304, Mar. 2008.
Guohong Cao and Liangzhong, “Cooperative Cache Based Data Access in Ad Hoc Networks” IEEE
Computer Society, (0018-9162), 2004.
Hao Yu, Patrick Martin, Hossam Hassanein,”Cluster-based Replication for Large-scale Mobile Ad-hoc
Networks” IEEE-2005.
Jing Zhao, Ping Zhang and Guohong Cao, “On Cooperative caching in Wireless P2P Networks”, IEEE2010.
J. Cao, Y. Zhang, G. Cao, and L. Xie, “Data Consistency for Cooperative Caching in Mobile
Environments,” Computer, vol. 40, no. 4, pp. 60-66, Apr. 2007.
L. Yin and G. Cao, “Supporting Cooperative Caching in Ad Hoc Networks,” IEEE Trans. Mobile
Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006.

www.irjes.com

59 | Page
A Co-Operative Cluster Based Data Replication Technique for Improving Data…
[7].

[8].
[9].
[10].
[11].
[12].
[13].
[14].
[15].

Madhavarao Boddu and Suresh Joseph, “Improving Data Accessibility and Query Delay in Cluster
based Cooperative Caching (CBCC) in MANET using LFU-MIN” IJCA (0975 – 8887), Volume 21–
No.9, May 2011.
Mieso K. Denko and Jun Tian, “Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc
Networks”, IEEE CCNC Proceedings,2008.
Prasanna Padmanabhan, Le Gruenwald, “Managing Data Replication In Mobile Adhoc Network
Databases” IEEE-2006.
T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,”
IEEE Trans. Mobile Computing,vol. 5, no. 11, pp. 1515-1532, Nov. 2006.
T. Hara, “Replica Allocation in Ad Hoc Networks with Data Update,” Proc. Int’l Conf. Mobile Data
Management (MDM), 2002.
T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc.
IEEE INFOCOM, 2001.
T.Hara, “Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks”, IEEE
Transactions on mobile computing, vol. 9, no. 2, February 2010.
Abdelouahid Derhab and Nadjib Badache, “Data Replication Protocols for Mobile Ad-Hoc Networks:
A Survey and Taxonomy” IEEE Comm.vol.11, no.2, Sep 2009.
T.Hara, “Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks”, IEEE, vol
9, no.2, Feb 2010.

www.irjes.com

60 | Page

More Related Content

What's hot

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...Editor IJCATR
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS ijp2p
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNpaperpublications3
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksIJERA Editor
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DTELKOMNIKA JOURNAL
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363SHIVA REDDY
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...eSAT Journals
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...eSAT Publishing House
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...IJCNCJournal
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast1crore projects
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringcsandit
 

What's hot (15)

AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS –...
 
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA  AND CHORD DHTS
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTS
 
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSNDistributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
Distributed Three Hop Routing Protocol for Enhancing Routing Process in WSN
 
Advance DBMS
Advance DBMSAdvance DBMS
Advance DBMS
 
Shortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor NetworksShortest Tree Routing With Security In Wireless Sensor Networks
Shortest Tree Routing With Security In Wireless Sensor Networks
 
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2DDevice Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
Device Discovery Schemes for Energy-Efficient Cluster Head Rotation in D2D
 
IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363IJSETR-VOL-3-ISSUE-12-3358-3363
IJSETR-VOL-3-ISSUE-12-3358-3363
 
D0441722
D0441722D0441722
D0441722
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...An efficient routing approach for aggregated data transmission along with per...
An efficient routing approach for aggregated data transmission along with per...
 
50 55
50 5550 55
50 55
 
A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...A genetic algorithm for constructing broadcast trees with cost and delay cons...
A genetic algorithm for constructing broadcast trees with cost and delay cons...
 
E42062126
E42062126E42062126
E42062126
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast
 
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clusteringData aggregation in wireless sensor network based on dynamic fuzzy clustering
Data aggregation in wireless sensor network based on dynamic fuzzy clustering
 

Viewers also liked

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
B221424
B221424B221424
B221424irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 

Viewers also liked (9)

International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
B221424
B221424B221424
B221424
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Similar to International Refereed Journal of Engineering and Science (IRJES)

ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...eSAT Journals
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2PIOSR Journals
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
DistributeddatabasesforchallengednetVinoth Chandar
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 
Bz32915919
Bz32915919Bz32915919
Bz32915919IJMER
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AKARTHIKEYAN V
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksEditor IJCATR
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkIOSR Journals
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...IJECEIAES
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...IEEEGLOBALSOFTTECHNOLOGIES
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Editor IJARCET
 
Mobile Ad hoc networking
Mobile Ad hoc networkingMobile Ad hoc networking
Mobile Ad hoc networkingHizbul Bahar
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ijcsity
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd Iaetsd
 

Similar to International Refereed Journal of Engineering and Science (IRJES) (20)

ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETsODRS: Optimal Data Replication Scheme for Time Efficiency In  MANETs
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETs
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Architecture and Evaluation on Cooperative Caching In Wireless P2P
Architecture and Evaluation on Cooperative Caching In Wireless  P2PArchitecture and Evaluation on Cooperative Caching In Wireless  P2P
Architecture and Evaluation on Cooperative Caching In Wireless P2P
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 
ROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTNROUTING STRATEGIES IN DTN
ROUTING STRATEGIES IN DTN
 
Bz32915919
Bz32915919Bz32915919
Bz32915919
 
V.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE AV.KARTHIKEYAN PUBLISHED ARTICLE A
V.KARTHIKEYAN PUBLISHED ARTICLE A
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
A Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor NetworksA Reliable Routing Technique for Wireless Sensor Networks
A Reliable Routing Technique for Wireless Sensor Networks
 
Improvement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor NetworkImprovement of limited Storage Placement in Wireless Sensor Network
Improvement of limited Storage Placement in Wireless Sensor Network
 
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
Improving the Proactive Routing Protocol using Depth First Iterative Deepenin...
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Mobile Ad hoc networking
Mobile Ad hoc networkingMobile Ad hoc networking
Mobile Ad hoc networking
 
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
ANALYSE THE PERFORMANCE OF MOBILE PEER TO PEER NETWORK USING ANT COLONY OPTIM...
 
Iaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme viaIaetsd a secured based information sharing scheme via
Iaetsd a secured based information sharing scheme via
 

More from irjes

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Carirjes
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimizationirjes
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Modelirjes
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughnessirjes
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsirjes
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...irjes
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...irjes
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model irjes
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Citiesirjes
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...irjes
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...irjes
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...irjes
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...irjes
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...irjes
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...irjes
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...irjes
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intentirjes
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...irjes
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Ageirjes
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armorirjes
 

More from irjes (20)

Automatic Safety Door Lock System for Car
Automatic Safety Door Lock System for CarAutomatic Safety Door Lock System for Car
Automatic Safety Door Lock System for Car
 
Squared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & OptimizationSquared Multi-hole Extrusion Process: Experimentation & Optimization
Squared Multi-hole Extrusion Process: Experimentation & Optimization
 
Analysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling ModelAnalysis of Agile and Multi-Agent Based Process Scheduling Model
Analysis of Agile and Multi-Agent Based Process Scheduling Model
 
Effects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface RoughnessEffects of Cutting Tool Parameters on Surface Roughness
Effects of Cutting Tool Parameters on Surface Roughness
 
Possible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constantsPossible limits of accuracy in measurement of fundamental physical constants
Possible limits of accuracy in measurement of fundamental physical constants
 
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
Performance Comparison of Energy Detection Based Spectrum Sensing for Cogniti...
 
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
Comparative Study of Pre-Engineered and Conventional Steel Frames for Differe...
 
Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model Flip bifurcation and chaos control in discrete-time Prey-predator model
Flip bifurcation and chaos control in discrete-time Prey-predator model
 
Energy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart CitiesEnergy Awareness and the Role of “Critical Mass” In Smart Cities
Energy Awareness and the Role of “Critical Mass” In Smart Cities
 
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
A Firefly Algorithm for Optimizing Spur Gear Parameters Under Non-Lubricated ...
 
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
The Effect of Orientation of Vortex Generators on Aerodynamic Drag Reduction ...
 
An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...An Assessment of The Relationship Between The Availability of Financial Resou...
An Assessment of The Relationship Between The Availability of Financial Resou...
 
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
The Choice of Antenatal Care and Delivery Place in Surabaya (Based on Prefere...
 
Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...Prediction of the daily global solar irradiance received on a horizontal surf...
Prediction of the daily global solar irradiance received on a horizontal surf...
 
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
HARMONIC ANALYSIS ASSOCIATED WITH A GENERALIZED BESSEL-STRUVE OPERATOR ON THE...
 
The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...The Role of Community Participation in Planning Processes of Emerging Urban C...
The Role of Community Participation in Planning Processes of Emerging Urban C...
 
Understanding the Concept of Strategic Intent
Understanding the Concept of Strategic IntentUnderstanding the Concept of Strategic Intent
Understanding the Concept of Strategic Intent
 
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
The (R, Q) Control of A Mixture Inventory Model with Backorders and Lost Sale...
 
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of AgeRelation Between Stress And Menstrual Cycle At 18-21 Years Of Age
Relation Between Stress And Menstrual Cycle At 18-21 Years Of Age
 
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block ArmorWave Transmission on Submerged Breakwater with Interlocking D-Block Armor
Wave Transmission on Submerged Breakwater with Interlocking D-Block Armor
 

Recently uploaded

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

International Refereed Journal of Engineering and Science (IRJES)

  • 1. International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 10 (October 2013), PP. 56-60 A Co-Operative Cluster Based Data Replication Technique for Improving Data Accessibility and Reducing Query Delay in Manet’s K.Priyatharshini1, Rajanandhini.P2 1 Computer Science/Sri Krishna Arts and Science/Bharathiyar/India Computer Application and Software System/Sri Krishna Arts and Science/Bharathiyar/India 2 Abstract:- MANETs are very popular because of its infrastructure less network. These mobile nodes serve as both hosts and routers so they can forward packets on behalf of each other. It has restricted computing resources and due to mobility of node there is much change in network topology. These restrictions raise several new challenges for data access applications with the respects of data availability and access delay. This result in lower data availability in mobile ad-hoc networks than in wired networks. One probable solution to avoid this problem is to take up replication techniques which increases data availability and decrease query response delay. The replication process duplicates and preserves the consistency of multiple copies of objects in different sites so that each client node can visit a local copy of an object instead of remote ones. In this way replication can considerably enhances a distributed system's availability, reliability and scalability. It replicates the recurrently used data that rely on neighbour’s memory when the connection among them is secure. The experimental result depicts that higher degree of data accessibility enhances the query delay also. So the proposed work is to enhance the data availability and decrease the query delay in the MANET. The proposed system deals with a better replication management technique for MANETs known as cluster related data replication technique to make available the needed data items from the neighbours node and able to choose which data items can be replicated at a node. After that there should be an effective replica restore algorithm to change the old copy of data items when change is required in the original copy of the data item. The results proved that proposed approach is much more efficient than the existing techniques. Keywords:- Clusters, cooperative, data availability, Datareplication, MobileAd-Hocnetworks, Query delay. I. INTRODUCTION In mobile ad hoc networks (MANETs), mobile nodes are in motion freely, network split-up may occur, where nodes in one partition cannot access data held by nodes in other partitions. Mobile adhoc networks considerably decrease the performance of data access. To solve this problem here data replication techniques will be used .Data replication can decrease the query delay due to the mobile nodes can get the data from some nearby replicas. Data replication solutions in both wired and wireless networks aim at either reducing the query delay or improving the data availability. But the both metrics are important to the mobile nodes. In a MANET mobile nodes collaboratively share data. Multiple nodes exist in the networks and they send query requests to other nodes for some particular data items. Each node makes replicas of the data items and maintains the replicas in its memory (or disk) space. During data replication, there is no central server that determines the distribution of replicas, and mobile nodes determine the data allocation in a distributed manner. Replicating most data locally can reduce the query delay, but it reduces the data availability due to many nodes may end up replicating the same data locally while other data items are not replicated by anyone. To increase the data accessibility, nodes should not replicate the data that neighbouring nodes already have it on its memory. Though, several mobile nodes only have restricted memory space, bandwidth, and power, and hence it is impracticable for one node to bring together and maintaining all the data considering these facts. Queries generated during network partition may fail because the requested data items are not available in the partition to which the client belongs. Each node preserves a few quantities of data locally and the node is called the original owner of the data. To improve the data accessibility, these data items may be replicated to other nodes. The new data replication techniques are used to trade off between the query delay and data availability in MANET. This improves the data availability in the MANET using data replication. Data replication is the process of sharing information between the mobile nodes and ensures the consistency between the resources. www.irjes.com 56 | Page
  • 2. A Co-Operative Cluster Based Data Replication Technique for Improving Data… In MANET sharing information is not easy task because all the nodes the data saved at other nodes may not be accessible. The new data replication technique increases the performance level and address the query delay problem. II. COOPERATIVE DATA REPLICATION In cooperative data replication, a node cooperates with each other and shares their memory space for replicating data for neighboring nodes. Among several nodes from a network one may send requests to other nodes for some specific data items. Here every node creates and maintains replica’s in its memory. In cooperative data replication one node my allocate memory space for replicating data of their neighboring nodes data. So this way the degree of cooperation among mobile nodes will be maintained. 2.1 One to One Data Replication In this approach each mobile node will cooperates at most one neighbor to decide data for replication. Among multiple available neighboring nodes it selects one node based on priority value for data replication. Consider node N1 and N2 are neighboring nodes. a1d and a2d be the access frequency for data d from node N1 and N2 respectively. Here each node computes cumulative access frequency to the data item d. For N1 to d CAF12d = (a1d+a2d × (1- f12) / s) --(1) For N2 to d CAF21d = (a2d+a1d × (1- f12) / s) –(2) So the priority value for node as follows P12d = CAF12d × f12 ……if replication is done at N1 P12d = CAF12d ……if replication is not done at N1 Therefore here every node considers high priority value data for making replication process. 2.2 Reliable Neighbor Data Replication In OTOO scheme, choice of choosing neighboring node is based access frequency while making replication. So it may reduce the degree of cooperation as such minimal. To increase the cooperation level, in reliable neighbor scheme node allocates more memory for replicating data for neighbors. For the node N1, N2 to be a reliable neighbor If 1 – f12 > ῖ (threshold) ---- (3) For a each node the allocated memory for replicating neighboring nodes data Callocate = C × min (1, for all reliable neighbors (1-f) / α) ------(4) In this scheme, the node makes replication of its available data up to the C - Callocate. Then priority value is calculated for the node to the data item. Here the allocated memory is reserved for the data item with high priority value. 2.3 Reliable Grouping Replication Here the OTOO considers only one neighbor and reliable neighbor chooses all one hop neighbors. But here to add more cooperation in RG scheme, the replicas of data will be shared among large reliable groups. So we can preserve a perfect cooperation between nodes. Initially all nodes transmits their ids and access frequency to all data items. Here set of bi-connected nodes considered to be linked if and only they have a consistent link i.e. 1 – f12 > ῖ (threshold) Then each set will be put into a group to form a reliable group. The average access probability of all data item is calculated using the following Pd = -----(5) The demand weighted access delay if replica of data d will be maintained at N 2, T2d = ∑ai ×t12 × sd -------(6) Select the node with high Pd to replicate the data in which node selection minimizes the delay access in the group. i.e., T1d = min {Tnd} for all node Nn € group. So here the allocation process is repeated until the entire data item is replicated. 2.4 Replica Management Using Clusters With all the nodes having the reliable links cluster is formed by using the LCC algorithm. When a node requires some data item it sends request to cluster head. When a node receives a data item it replicate the data item locally for future use. www.irjes.com 57 | Page
  • 3. A Co-Operative Cluster Based Data Replication Technique for Improving Data… Each mobile node is associated with a cluster and refers to the set of nodes that can be reached by the node within the given number of hops. Every cluster has its cluster head (CH). Each cluster head will maintain a table Replica Table (RT) and replica index (RI). This RT will contain the information about the replicas that are available with different node in that cluster. There will be 3 entries related to each node: node-id, item-id, spaceavailable. The RI contains node id, data size and TTL value. When a mobile node needs a new data item then first it will check whether the data item is locally available or not. If yes then data item is get back to the requester and if not the request forwarded to the CH. Now CH will check the item-id in RT to see whether the data item is available in the cluster. If any matched entry is found the request is redirected to that node pertaining to that item-id. Otherwise CH will request that data item to other CHs if data is found then request forwarding is stopped and data is returned to the requester. When a node receives a data item then, it will make a replica of it for upcoming use. And an update message is send to its CH. In the process of returning the data item to the client node, a node in underlying path, if it is a CH, then it start replication process (RP). In RP, initially cluster head will get the size of the data item whose replica needs to be created in that cluster. Now cluster head will check its RT and check for a node with free space available greater than the size of data item di. Now if CH gets a node with space-available greater than or equals to the size data item, then CH replicate the data item on that node. After replicating data item on that node, node will send a message to the CH so that CH will update its entries related to that node in RT. Now if CH fails to get a node with space-available greater than or equals to the size data item, then CH will choose a node with maximum free space available. After selecting node CH redirect that node to call a procedure (MCR (NK, S)) to create enough space to replicate that data item on that node. In this process the node will remove some data items. Decision of removing the data items at a node will be based upon the Replacement Policy. After successful creation of free space at that node, CH will replicating that data item on that node, node will send a message to the CH so that CH will update its entries related to that node in RT. After updating its RT, the CH will send this update that item is found then this update is discard otherwise CH will choose a mobile node where the replica of that item can be made. The node with maximum available free space will be selected. III. SIMULATION RESULTS Here NS2 is used to stimulate the replica allocation and maintenance using clusters. The mobile adhoc network considered as an undirected graph G (V, E) in which it contains 30 mobile nodes for simulation using a random waypoint model. It contains n data items which are disseminated in the network. For simplicity all data items are in unit size. Here each mobile node can only replicate (C < number of nodes). Here the following figures represent data availability and query delay simulation results as a graph. The reliable link is fully resided on link failure probability. Finding link failure probability is quite difficult and for simplicity we assume that it is based on signal strength. IV. FIGURES www.irjes.com 58 | Page
  • 4. A Co-Operative Cluster Based Data Replication Technique for Improving Data… Fig.1 Replica Management Using Clustered Approach Fig.2 Data Availability Fig.3 Query Delay V. CONCLUSION Network partitions are common due to link failure in MANETs. As a result data saved at other nodes may not be available. One way to improve data availability is through data replication. The proposed several data replication schemes improve the data availability and reduce the query delay. The perfect idea is to replicate the most frequently accessed data locally and only rely on neighbour’s memory when the communication link to them is reliable. The proposed replication management technique for MANETs proved efficient to deliver requested data items from the neighbours node and capable to decide which data items can be replicated at a node. Also using cluster based replica allocation of data will make an effective trade-off between query delay and data availability in MANET’s. REFERENCES [1]. [2]. [3]. [4]. [5]. [6]. B. Tang, H. Gupta, and S. Das, “Benefit-Based Data Caching in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 7, no. 3,pp. 289-304, Mar. 2008. Guohong Cao and Liangzhong, “Cooperative Cache Based Data Access in Ad Hoc Networks” IEEE Computer Society, (0018-9162), 2004. Hao Yu, Patrick Martin, Hossam Hassanein,”Cluster-based Replication for Large-scale Mobile Ad-hoc Networks” IEEE-2005. Jing Zhao, Ping Zhang and Guohong Cao, “On Cooperative caching in Wireless P2P Networks”, IEEE2010. J. Cao, Y. Zhang, G. Cao, and L. Xie, “Data Consistency for Cooperative Caching in Mobile Environments,” Computer, vol. 40, no. 4, pp. 60-66, Apr. 2007. L. Yin and G. Cao, “Supporting Cooperative Caching in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006. www.irjes.com 59 | Page
  • 5. A Co-Operative Cluster Based Data Replication Technique for Improving Data… [7]. [8]. [9]. [10]. [11]. [12]. [13]. [14]. [15]. Madhavarao Boddu and Suresh Joseph, “Improving Data Accessibility and Query Delay in Cluster based Cooperative Caching (CBCC) in MANET using LFU-MIN” IJCA (0975 – 8887), Volume 21– No.9, May 2011. Mieso K. Denko and Jun Tian, “Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks”, IEEE CCNC Proceedings,2008. Prasanna Padmanabhan, Le Gruenwald, “Managing Data Replication In Mobile Adhoc Network Databases” IEEE-2006. T. Hara and S.K. Madria, “Data Replication for Improving Data Accessibility in Ad Hoc Networks,” IEEE Trans. Mobile Computing,vol. 5, no. 11, pp. 1515-1532, Nov. 2006. T. Hara, “Replica Allocation in Ad Hoc Networks with Data Update,” Proc. Int’l Conf. Mobile Data Management (MDM), 2002. T. Hara, “Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility,” Proc. IEEE INFOCOM, 2001. T.Hara, “Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks”, IEEE Transactions on mobile computing, vol. 9, no. 2, February 2010. Abdelouahid Derhab and Nadjib Badache, “Data Replication Protocols for Mobile Ad-Hoc Networks: A Survey and Taxonomy” IEEE Comm.vol.11, no.2, Sep 2009. T.Hara, “Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks”, IEEE, vol 9, no.2, Feb 2010. www.irjes.com 60 | Page