SlideShare a Scribd company logo
The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 4 || Pages || 49 - 54 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 49
Survey on Phoenix: Storage Using an Autonomous Mobile
Infrastructure
1,
Mr. Mahesha H.S, 2,
Mr. Prasanna Kumar M
1,
M.tech Student in East West Institute of Technology, Dept of CSE
Bangalore, Karnataka, India.
Assistant professor
2,
East West Institute of Technology, Dept of CSE Bangalore, Karnataka, India.
-----------------------------------------------------------ABSTRACT-----------------------------------------------------------
Distributed computing is a science which solves a large problem by giving small parts of the problem to many
computers to solve and then combining the solutions for the parts into a solution for the problem. As the
increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-
centric storage provides energy-efficient data dissemination and organization. One of the approaches in data
centric storage is that the nodes that collected data will transfer their data to other neighbouring nodes that
store the similar type of data. However, when the nodes are mobile, type-based data distribution alone cannot
provide robust data storage and retrieval, since the nodes that store similar types may move far away and
cannot be easily reachable in the future. Reliable storage of data with concurrent read/write accesses still
appears to be a challenging problem in mobile ad hoc networks.
KEYWORDS: Distributed Coding, Distributed storage, Distributed systems, Mobile ad hoc network (MANET),
Mobile storage systems, Replication, Reliable Data Storage.
-------------------------------------------------------------------------------------------------------------------------------- -----
Date of Submission: 15 March 2014 Date of Publication: 05 April 2014
--------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
A Mobile Ad hoc network (MANET) is a collection of wireless nodes communicating with each other
in the absence of any infrastructure. Existing cloud service providers use centralized data centres to provide
computation and storage services to the users. The distributed data storage on unreliable devices, connected by a
short-range radio network is analyzed. Failing devices incur loss of data. To prevent the loss, the data is split and
distributed across the network. Combining networking and storage has created a platform with numerous
possibilities allowing Distributed Storage Systems (DSS) to adopt roles vast and varied which fall well beyond
data storage. Networking infrastructure and distributed computing share a close relationship. Distributed systems
designed to operate on the Internet need to cope with a potential user base numbering in the millions. To
accommodate a large user base, distributed systems are employing more scalable decentralised Peer-to-Peer
architectures over conventional centralised architectures. Distributed systems which operate across a public
network need to accommodate for a variety of potentially malicious behaviour from free-riding to Denial of
Service (DoS) attacks.A distributed computer system consists of multiple software components that are on
multiple computers, but run as a single system. The computers that are in a distributed system can be physically
close together and connected by a local network, or they can be geographically distant and connected by a wide
area network. A distributed system can consist of any number of possible configurations, such as mainframes,
personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such
a network work as a single computer.
Distributed systems offer many benefits over centralized systems, including the following:
Scalability: The system can easily be expanded by adding more machines as needed.
Redundancy: Several machines can provide the same services, so if one is unavailable, work does not stop.
Additionally, because many smaller machines can be used, this redundancy does not need to be prohibitively
expensive.
Distributed computing systems can run on hardware that is provided by many vendors, and can use a
variety of standards-based software components. Such systems are independent of the underlying software. They
can run on various operating systems, and can use various communications protocols. Ensuring data persistence
is a major challenge in designing a mobile storage system because of various reasons.
Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 50
Due to their arbitrary movement patterns, mobile devices can leave or join networks non-
deterministically, making data persistence challenging. Mobile devices can shut down or fail unexpectedly. Also,
mobile devices may delete some cached data contents due to lack of sufficient storage space. Wireless
communications among mobile devices are error-prone. Furthermore a lot of applications in this situations are
time dependant and, therefore, their connections be supposed to be perform not simply appropriately, however as
well contained by their time limits. In a Distributed Database System, Data is repeatedly replicated to get better
consistency and accessibility. Though one significant subject to be measured as replicating Data is the accuracy
of the Replicated Data. As Nodes in MANETS are Mobile and contain some degree of Power, disentanglement
might happen often, cause a group of Network separation. Mobile hosts cannot access data, which is obtainable
in Mobile hosts in one division in another detachment. The subject connected to Data Replication in MANETS
Databases is as. Server Power Consumption: Servers in MANETS run on battery Power. If Servers have a small
Power remains and if it replicated with numerous often-contact Data objects, then the numerous Data access
requests for these hot Data will consume its Power.
Server Mobility: Because of its Mobility, Servers may from time to time shift to a position where they might
not be getting in touch with by any other Servers or Clients.
Client Mobility: Client which inquiry Servers for Information is as well Mobile. Clients more often than not
launch their contacts to the adjacent Servers to obtain a rapid reaction. The choice to Replicate Data substance at
exacting Servers might be found on the way in frequencies of Data matter from those precise Servers. Therefore,
the judgment to Replicate Data stuff at suitable Servers has to be dynamic and found on the current Network
topology
Client Power: Clients in MANETS also run on battery Power. If Clients stay excessively extended for its
communications fallout, it may drop its Power quickly. The Replication technique ought to be capable to
Replicate Data matter at suitable Servers in such a way that a Client may be capable to contact its demanded
Data substances from its adjacent Server, which has the smallest amount workload.
Time Critical Applications: Numerous MANET applications, like rescue Networks, military processes, are
time dependant. Data Replication is supposed to be used to progress Data ease of access and performance of the
System, thus falling the time to perform communications. Dealings with short time limit ought to be sent to the
nearest Server, which contain the smallest amount workload for their implementation.
II. LITERATURE SURVEY
a) Wangand Li [14] proposed In order to minimize the communication overhead and achieve efficient data
retrieval in data-centric mobile environments, we propose a fully distributed neighbourhood prediction scheme
that utilizes past node trajectory information to determine the near likely node in the future as the best content
distribute As in any traditional distributed setting, a set of runtime algorithms to ensure the availability of
centralized services to all mobile nodes in networks that are frequently partitioned and is a non-power-aware,
non-real-time-aware, and partition-aware system. An ideal MANET data replication strategy should be power-
aware, real-time-aware, and partition-aware. Phoenix, as an underlying storage layer can help reduce the
complexity of MANET databases by handling the node mobility and communication failures in a power-efficient
manner, while guaranteeing the level of redundancy.
b) The ―classic‖ academic approach to providing highly available data objects, the state-machine approach ,
consists in synchronizing a set of server replicas, each hosting a copy of the data, to handle all updates and
queries in the same way (―write all – read one‖). This approach provides perfect guarantees in theory, yet is
expensive to implement even in wired networks. In particular, the atomic broadcast protocol ensures that each
server replica obtains all updates and in the same order, but it comes with a prohibitively large overhead. Clearly,
with an underlying highly dynamic adhoc network, the synchronism required for state machine replication
becomes un-practicable. Even with weaker consistency guarantees (e.g., without ordering guarantees), state
machine replication leads to poor performance in adhoc networks. Further sacrificing safety guarantees such as
atomicity through the use of a probabilistic dissemination of updates (e.g., probabilistic broadcast ) is indeed an
option, yet the incurred overhead is not low enough to address a broad application context. A more drastic shift
seems to be necessary.
c) Distributed storage systems such as OceanStore use Distributed Hash Tables (DHT) to manage the mapping
from a collection of keys to values autonomously without any central control. DHT-based systems [5], [6], [7],
Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 51
[8],attempt to reduce the latency among nodes on wide-area networks by constantly updating their routing tables
to improve the lookup speed. Phoenix, on the other hand, focuses on maintaining the desired number of copies of
the data items in autonomous mobile nodes within a geographic region.
d) By introducing probabilities for the intersection of individual quorums, the construction rules for these
quorums are relaxed, and more freedom is left for trading protocol overhead for reliability. As this smoother
tradeoff has constituted the driving force behind probabilistic quorum systems, it also turns out that the resulting
reduced determinism makes such an approach more viable than a strict approach for ad hoc networks. Problem
for providing reliable storage in MANETs using probabilistic quorum system [9].
e) The Random Waypoint Mobility Model is used in many prominent simulation studies of ad hoc network
protocols. For example a conference setting or museum. The Gauss-Markov Mobility Model also provides
movement patterns that one might expect in the real-world, if appropriate parameters are chosen. In addition, this
method also forces MNs to keep away from the edges of the simulation area While the Probabilistic Random
Walk Mobility Model also provides movement patterns that one might expect in the real-world, choosing
appropriate parameters for the probability matrix may be difficult. The Manhatten Model appears to create
realistic movements for a section of a city since it severely restricts the travelling behaviour of MNs, MNs do not
have the ability to roam freely without regard to obstacles and other traffic regulations. The Reference Point
Group Mobility Model (RPGM) is a generic method for handling group mobility. These are the models proposed
for mobile Adhoc networks to aid in designing efficient communication protocols for networks [10],[11].
f) Phoenix, on the other hand, is more deterministic in nature. Its primary goal is to maintain the desired level of
data storage redundancy fairly accurately. While Phoenix does not support data updates directly, MANET
databases that require data replication [12] can be built on top of Phoenix and rely on its protocol to handle
issues related to node mobility and unreliable communication channels.
g) Using error correction coding in distributed systems for fault tolerance has not been widely applied in multi-
agent systems. Current multi-agent platforms like JADE and COUGAAR use replication. Replication needs a lot
of storage and bandwidth support, and information theoretic results tell us that we can do better. Some
information theoretic ideas are used by the CFS cooperative storage and the OceanStore. In [13], Miletic and
Dewilde consider reliability of a distributed storage system using an information-theoretic approach.
h) The push-pull method for data dissemination through the three way handshake of advertisement-request-code
has been used previously in sensor networks with sensed data taking the place of code. Protocols such as SPIN
[3] and SPMS [4] rely on the advertisement and the request packets being much smaller than the data packets
and the redundancy in the network deployments which make several nodes disinterested in any given
advertisement. However, in the data dissemination protocols, there is only suppression of the requests and the
data sizes are much smaller than the entire binary code images.
i) Reliable multicast in unreliable environments, such as ad-hoc networks, can be achieved by epidemic multicast
protocols based on each node gossiping the message it received to a subset of neighbours [2]. These protocols
give probabilistic guarantee for the update to reach all the group members. The probability is monotonically
increasing with the fan-out of each node (the number of neighbours to gossip to) and the quiescence threshold
(the time after which a node will stop gossiping to its neighbours). By increasing the quiescence threshold, the
reliability can be made to approach 2, which is the basic premise behind all the epidemic based code update
protocols in sensor networks – Deluge, MNP, and Freshet.
j) Various models[15] for mobility are 1. Random Waypoint Mobility Model: A model that includes pause times
between changes in destination and speed.
2. Reference Point Group Model: A model that forces MNs to travel to according to the speed and direction of
group leader
3. City Section Based Models: Freeway Mobility model where A node here moves in lanes as in case of city and
its velocity depends on previous one and in case of Manhattan Mobility model where Nodes are free to move in
any direction
4 Gauss-Markov Mobility Model: A model that uses one tuning parameter to vary the degree of randomness in
the mobility pattern.
5. A Probabilistic Version of the Random Walk Mobility Model: A model that utilizes a set of probabilities to
determine the next position of an MN.
Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 52
III. EXISTING SYSTEM
Fig 1: Flow chart showing the overview of phoenix. The shaded and unshaded blocks are the winner and the
follower respectively.
When a node joins the network, it may or may not have information blocks. Each node starts an
advertisement timer asynchronously—independent of the advertisement timers of other nodes. If the node does
not receive any advertisement message before its advertisement timer expires, it assumes that it has won the
round and broadcasts an advertisement for one of the blocks (say b1) that it currently possesses. If the node hears
an advertisement message before its advertisement timer fires, it assumes that it has lost the current round and
becomes a follower node. The follower node checks if it has b1—the block advertised by the winner node. If so,
it starts a reply timer and when that timer expires, it broadcasts an advertisement for b1, if it has heard less than
K advertisements for b1 in the current round. If it has heard K or more advertisements for b1, it deletes b1
because it knows that there are K or more nodes storing the copies of b1. On the other hand, if the follower node
does not have b1, it starts a request timer and when that timer expires, it checks if it has heard K or more
advertisements for b1. If so, it knows that there are K copies of b1 and, thus, does nothing and starts a new
round. If it does not hear K or more advertisements for b1, it suspects that there may be less than K copies of b1
in the network. At this point, the node does not conclude that there are less than K copies because it may have
missed some advertisements due to wireless communication failures. To ensure that there are indeed less than K
copies of b1, it goes to the verification step, where it communicates with its neighbors to determine if they have
b1. After the verification step, if the node finds that there are K or more copies of b1, it does nothing and starts a
new round. Otherwise, it goes to the data download state, where it downloads b1 from one of its neighbors.
Then, the node starts a new round.
IV. PROPOSED SYSTEM
Node1 With
All 10 Blocks
Node 2 With
3 Blocks
Node 3 with First
4 Blocks
Node 4 with
block no 5,6
Internet
or
Network
Node 8 with
block no 7,8,9,10
Node 7 with
block no 7,8,9,10
Node 6 with
block no 5,6
Node 5 with
First 4 Blocks
KDC
(Key Distribution
Center)
Fig2: content distribution among several nodes
Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 53
The above diagram shows the practical implementation of our proposed approach with contents
distributed among several nodes. In this approach we design a content distribution approach, for which we
propose an algorithm called phoenix which is described below We are enhancing the application by proving the
security to the algorithm by introducing key distribution center. KDC provides the service of generating and
distribution public/ private keys to the set of group of nodes in the network. Each node when joining the group
contacts the key distribution center and get the private key for the group using RSA Algorithm (Chinese
Reminder Theorem).Then the node performs the following initiation.
Functional Requirements
The functional requirements for a system describe what the system should do. These requirements
depend on the type of software being developed, the expected users of the software and the general approach
taken by the organization when writing requirements. When expressed as user requirements, the requirements
are usually described in a fairly abstract way. However, functional system requirements describe the system
function in detail, its inputs and outputs, exceptions, and so on.
Functional requirements are as follows:
 The proposed system should ensure the longevity of the stored data, even in the presence of
autonomous node mobility.
 The protocol proposed should scale well with the number of mobile devices and cached information
content.
 The protocol should be asynchronous
Non-Functional Requirement
Non-functional requirements, as the name suggests, are requirements that are not directly concerned
with the specific functions delivered by the system. They may relate to emergent system properties such as
reliability, response time and store occupancy. Alternatively, they may define constraints on the system such as
the capabilities of I/O devices and the data representations used in system interfaces.
 All nodes should be within the communication range of each other.
 Does not require central control or global knowledge about the current network conditions.
V. CONCLUSION
To improve network connectivity, researchers have proposed many mobility prediction schemes to
predict the future availability of wireless links, for the purpose of building more stable end-to-end connections.
In contrast, there are fewer studies of the effect of dynamic network topology on application-level issues, such as
the provisioning of centralized service in wireless ad-hoc networks. Although distributed applications are better
suited for the adhoc network due to its peer-to-peer architecture, important network applications and services
such as web servers, location information databases and network services. The main appeal of the wireless
cellular and ad-hoc networks is that they allow both user mobility and unthread connectivity. However, user
mobility poses significant challenges to network operations such as routing, resource management, and Quality
of Service (QoS) provisioning. Node mobility leads to frequent disconnections of wireless links, hence the
network topology changes dynamically. We propose a fully distributed grouping algorithm for a node to identify
its stable group the group of nodes it has reliable connectivity with at run-time, using only local observations.
REFERENCES
[1] Jun Luo, JeanPierre Hubaux, Patrick Th. Eugster, School of Computer and Communication Sciences Swiss Federal Institute of
Technology (EPFL), Lausanne, Switzerland "PAN: Providing Reliable Storage in Mobile Ad Hoc Networks with Probabilistic
Quorum Systems" June 1–3, 2003, 5005-67322
[2] J. Luo, P. T. Eugster, and J. P. Hubaux, "Route driven gossip: probabilistic reliable multicast in ad hoc networks," at the Twenty-
Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 2229-2239, 2003.
[3] J. Kulik, W. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor
networks," Wireless Networks, vol. 8, no. 2/3, pp. 169-185, 2002.
[4] G. Khanna, S. Bagchi, and Y-S. Wu, "Fault tolerant energy aware data dissemination protocol in sensor networks," at the
International Conference on Dependable Systems and Networks, pp. 795-804, 2004.
[5] S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu, ―OpenDHT: A Public DHT
Service and Its Uses,‖ ACM SIGCOMM Computer Comm. Rev., vol. 35, pp. 73-84, 2005.
[6] A. Rowstron and P. Druschel, ―Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer
Systems,‖ Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms Heidelberg (Middleware ’01), pp. 329-350, 2001.
[7] I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, ―Chord: A Scalable Peer-to-Peer Lookup Service for Internet
Applications,‖ ACM SIGCOMM Computer Comm. Rev., vol. 31, no.4, pp. 149-160, 2001
[8] B. Zhao, J. Kubiatowicz, and A. Joseph, ―Tapestry: A Fault-Tolerant Wide-Area Application Infrastructure,‖ ACM SIGCOMM
Computer Comm. Rev., vol. 32, p. 81, 2002.
[9] D. Malkhi, M.K. Reiter, A. Wool, and R.N. Wright, ―Probabilistic Quorum Systems,‖ Information and Computation, vol. 170, no.
2,pp. 184-206, 2001.
Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 54
[10] T. Camp, J. Boleng, and V. Davies, ―A Survey of Mobility Models for Adhoc Networks,‖ Wireless Comm. and Mobile
Computing, vol. 2, pp. 483-502, 2002.
[11] X. Hong, M. Gerla, G. Pei, and C. Chiang, ―A Group Mobility Model for Ad Hoc Wireless Networks,‖ Proc. ACM Second Int’l
Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999.
[12] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, ―A Survey of Data Replication Techniques for Mobile Ad Hoc
Network Databases,‖ The VLDB J., vol. 17, no. 5, pp. 1143-1164, 2008.
[13] F. Miletic and P. Dewilde, ―Data Storage in Unreliable Multi-Agent Networks,‖ Proc. Conf. Autonomous agents and Multiagent
Systems, 2005.
[14] K. Wang and B. Li, ―Efficient and Guaranteed Service Coverage in Partitionable Mobile Ad-Hoc Networks,‖ Proc. IEEE
INFOCOM,2002.
[15] Tracy Camp ,Jeff Boleng, Vanessa Davies, ―A Survey of Mobility Models for Ad Hoc Network Research‖, Wireless
Communication & Mobile Computing (WCMC) Special issue on Mobile Ad Hoc Networking: Research, Trends and
Applications, vol. 2, no. 5, pp. 483-502, 2002.

More Related Content

What's hot

A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
ijcses
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocols
Devdutta Chakrabarti
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
Iaetsd Iaetsd
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
Editor IJARCET
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
IOSR Journals
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET Journal
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
IRJET Journal
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Darpan Dekivadiya
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
ijiert bestjournal
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
ijfcstjournal
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
eSAT Publishing House
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
IEEEFINALYEARPROJECTS
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
IJET - International Journal of Engineering and Techniques
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
IJCNCJournal
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed system
IJECEIAES
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
cscpconf
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
IJECEIAES
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
iosrjce
 

What's hot (19)

A survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networksA survey of real-time routing protocols For wireless sensor networks
A survey of real-time routing protocols For wireless sensor networks
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocols
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581Ijarcet vol-2-issue-2-576-581
Ijarcet vol-2-issue-2-576-581
 
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...
 
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...
 
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...
 
Performance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor NetworksPerformance Analysis of Routing Protocols of Wireless Sensor Networks
Performance Analysis of Routing Protocols of Wireless Sensor Networks
 
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
[IJET-V1I4P2] Authors : Doddappa Kandakur; Ashwini B P
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
Survey on replication techniques for distributed system
Survey on replication techniques for distributed systemSurvey on replication techniques for distributed system
Survey on replication techniques for distributed system
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...Efficiency enhancement using optimized static scheduling technique in TSCH ne...
Efficiency enhancement using optimized static scheduling technique in TSCH ne...
 
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...
 

Viewers also liked

H03402054058
H03402054058H03402054058
H03402054058
theijes
 
K03401065070
K03401065070K03401065070
K03401065070
theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
I0324053055
I0324053055I0324053055
I0324053055
theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
L021203080089
L021203080089L021203080089
L021203080089
theijes
 
G03406041045
G03406041045G03406041045
G03406041045
theijes
 
D03402029035
D03402029035D03402029035
D03402029035
theijes
 
E03404025032
E03404025032E03404025032
E03404025032
theijes
 
H032030068074
H032030068074H032030068074
H032030068074
theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
B03403007011
B03403007011B03403007011
B03403007011
theijes
 
E0321031039
E0321031039E0321031039
E0321031039
theijes
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
D0321019030
D0321019030D0321019030
D0321019030
theijes
 
D03406028031
D03406028031D03406028031
D03406028031
theijes
 
C03405021028
C03405021028C03405021028
C03405021028
theijes
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
B03402012020
B03402012020B03402012020
B03402012020
theijes
 

Viewers also liked (19)

H03402054058
H03402054058H03402054058
H03402054058
 
K03401065070
K03401065070K03401065070
K03401065070
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
I0324053055
I0324053055I0324053055
I0324053055
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
L021203080089
L021203080089L021203080089
L021203080089
 
G03406041045
G03406041045G03406041045
G03406041045
 
D03402029035
D03402029035D03402029035
D03402029035
 
E03404025032
E03404025032E03404025032
E03404025032
 
H032030068074
H032030068074H032030068074
H032030068074
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
B03403007011
B03403007011B03403007011
B03403007011
 
E0321031039
E0321031039E0321031039
E0321031039
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
D0321019030
D0321019030D0321019030
D0321019030
 
D03406028031
D03406028031D03406028031
D03406028031
 
C03405021028
C03405021028C03405021028
C03405021028
 
The International Journal of Engineering and Science (The IJES)
 The International Journal of Engineering and Science (The IJES) The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
B03402012020
B03402012020B03402012020
B03402012020
 

Similar to H03401049054

IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
tsysglobalsolutions
 
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Eswar Publications
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
ijassn
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET Journal
 
Embedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud ChallengesEmbedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud Challenges
FossilShale Embedded Technologies Pvt Ltd
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
ijassn
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
20TUCS251VIJAYASHARA
 
A 01
A 01A 01
A 01
kakaken9x
 
Building a Highly Available Data Infrastructure
Building a Highly Available Data InfrastructureBuilding a Highly Available Data Infrastructure
Building a Highly Available Data Infrastructure
DataCore Software
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
IJERA Editor
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Eswar Publications
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
Sushil Kumar
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET Journal
 
B02120307013
B02120307013B02120307013
B02120307013
theijes
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
ijwmn
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
IJSRED
 
F233842
F233842F233842
F233842
irjes
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
 
An Efficient Queuing Model for Resource Sharing in Cloud Computing
	An Efficient Queuing Model for Resource Sharing in Cloud Computing	An Efficient Queuing Model for Resource Sharing in Cloud Computing
An Efficient Queuing Model for Resource Sharing in Cloud Computing
theijes
 

Similar to H03401049054 (20)

IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...
 
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...
 
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
IRJET-  	  An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET-  	  An Efficient Data Replication in Salesforce Cloud Environment
IRJET- An Efficient Data Replication in Salesforce Cloud Environment
 
Embedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud ChallengesEmbedded systems Implementation in Cloud Challenges
Embedded systems Implementation in Cloud Challenges
 
A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...A cross layer protocol based on mac and routing protocols for healthcare appl...
A cross layer protocol based on mac and routing protocols for healthcare appl...
 
DISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docxDISTRIBUTED SYSTEM 16M.docx
DISTRIBUTED SYSTEM 16M.docx
 
A 01
A 01A 01
A 01
 
Building a Highly Available Data Infrastructure
Building a Highly Available Data InfrastructureBuilding a Highly Available Data Infrastructure
Building a Highly Available Data Infrastructure
 
Study Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN SystemStudy Of Coded Based Mechanism In WSN System
Study Of Coded Based Mechanism In WSN System
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
 
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET-  	  Improving Data Availability by using VPC Strategy in Cloud Environ...
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...
 
B02120307013
B02120307013B02120307013
B02120307013
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
 
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkEnsuring the Adaptive Path for the Routing in 5g Wireless Network
Ensuring the Adaptive Path for the Routing in 5g Wireless Network
 
F233842
F233842F233842
F233842
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
An Efficient Queuing Model for Resource Sharing in Cloud Computing
	An Efficient Queuing Model for Resource Sharing in Cloud Computing	An Efficient Queuing Model for Resource Sharing in Cloud Computing
An Efficient Queuing Model for Resource Sharing in Cloud Computing
 

Recently uploaded

Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
Madan Karki
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
co23btech11018
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
gowrishankartb2005
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
Gino153088
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
bjmsejournal
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
Yasser Mahgoub
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
GauravCar
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
Anant Corporation
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
UReason
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
kandramariana6
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
RamonNovais6
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
TaghreedAltamimi
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
Mahmoud Morsy
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
Hitesh Mohapatra
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
bijceesjournal
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
IJECEIAES
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
VANDANAMOHANGOUDA
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
bijceesjournal
 

Recently uploaded (20)

Seminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptxSeminar on Distillation study-mafia.pptx
Seminar on Distillation study-mafia.pptx
 
Computational Engineering IITH Presentation
Computational Engineering IITH PresentationComputational Engineering IITH Presentation
Computational Engineering IITH Presentation
 
Material for memory and display system h
Material for memory and display system hMaterial for memory and display system h
Material for memory and display system h
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
4. Mosca vol I -Fisica-Tipler-5ta-Edicion-Vol-1.pdf
 
Design and optimization of ion propulsion drone
Design and optimization of ion propulsion droneDesign and optimization of ion propulsion drone
Design and optimization of ion propulsion drone
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
2008 BUILDING CONSTRUCTION Illustrated - Ching Chapter 02 The Building.pdf
 
artificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptxartificial intelligence and data science contents.pptx
artificial intelligence and data science contents.pptx
 
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by AnantLLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
LLM Fine Tuning with QLoRA Cassandra Lunch 4, presented by Anant
 
Data Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason WebinarData Driven Maintenance | UReason Webinar
Data Driven Maintenance | UReason Webinar
 
132/33KV substation case study Presentation
132/33KV substation case study Presentation132/33KV substation case study Presentation
132/33KV substation case study Presentation
 
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURSCompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
CompEx~Manual~1210 (2).pdf COMPEX GAS AND VAPOURS
 
Software Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.pptSoftware Quality Assurance-se412-v11.ppt
Software Quality Assurance-se412-v11.ppt
 
Certificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi AhmedCertificates - Mahmoud Mohamed Moursi Ahmed
Certificates - Mahmoud Mohamed Moursi Ahmed
 
Generative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of contentGenerative AI leverages algorithms to create various forms of content
Generative AI leverages algorithms to create various forms of content
 
Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...Comparative analysis between traditional aquaponics and reconstructed aquapon...
Comparative analysis between traditional aquaponics and reconstructed aquapon...
 
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
 
ITSM Integration with MuleSoft.pptx
ITSM  Integration with MuleSoft.pptxITSM  Integration with MuleSoft.pptx
ITSM Integration with MuleSoft.pptx
 
Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...Rainfall intensity duration frequency curve statistical analysis and modeling...
Rainfall intensity duration frequency curve statistical analysis and modeling...
 

H03401049054

  • 1. The International Journal Of Engineering And Science (IJES) || Volume || 3 || Issue || 4 || Pages || 49 - 54 || 2014 || ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805 www.theijes.com The IJES Page 49 Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure 1, Mr. Mahesha H.S, 2, Mr. Prasanna Kumar M 1, M.tech Student in East West Institute of Technology, Dept of CSE Bangalore, Karnataka, India. Assistant professor 2, East West Institute of Technology, Dept of CSE Bangalore, Karnataka, India. -----------------------------------------------------------ABSTRACT----------------------------------------------------------- Distributed computing is a science which solves a large problem by giving small parts of the problem to many computers to solve and then combining the solutions for the parts into a solution for the problem. As the increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data- centric storage provides energy-efficient data dissemination and organization. One of the approaches in data centric storage is that the nodes that collected data will transfer their data to other neighbouring nodes that store the similar type of data. However, when the nodes are mobile, type-based data distribution alone cannot provide robust data storage and retrieval, since the nodes that store similar types may move far away and cannot be easily reachable in the future. Reliable storage of data with concurrent read/write accesses still appears to be a challenging problem in mobile ad hoc networks. KEYWORDS: Distributed Coding, Distributed storage, Distributed systems, Mobile ad hoc network (MANET), Mobile storage systems, Replication, Reliable Data Storage. -------------------------------------------------------------------------------------------------------------------------------- ----- Date of Submission: 15 March 2014 Date of Publication: 05 April 2014 -------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION A Mobile Ad hoc network (MANET) is a collection of wireless nodes communicating with each other in the absence of any infrastructure. Existing cloud service providers use centralized data centres to provide computation and storage services to the users. The distributed data storage on unreliable devices, connected by a short-range radio network is analyzed. Failing devices incur loss of data. To prevent the loss, the data is split and distributed across the network. Combining networking and storage has created a platform with numerous possibilities allowing Distributed Storage Systems (DSS) to adopt roles vast and varied which fall well beyond data storage. Networking infrastructure and distributed computing share a close relationship. Distributed systems designed to operate on the Internet need to cope with a potential user base numbering in the millions. To accommodate a large user base, distributed systems are employing more scalable decentralised Peer-to-Peer architectures over conventional centralised architectures. Distributed systems which operate across a public network need to accommodate for a variety of potentially malicious behaviour from free-riding to Denial of Service (DoS) attacks.A distributed computer system consists of multiple software components that are on multiple computers, but run as a single system. The computers that are in a distributed system can be physically close together and connected by a local network, or they can be geographically distant and connected by a wide area network. A distributed system can consist of any number of possible configurations, such as mainframes, personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such a network work as a single computer. Distributed systems offer many benefits over centralized systems, including the following: Scalability: The system can easily be expanded by adding more machines as needed. Redundancy: Several machines can provide the same services, so if one is unavailable, work does not stop. Additionally, because many smaller machines can be used, this redundancy does not need to be prohibitively expensive. Distributed computing systems can run on hardware that is provided by many vendors, and can use a variety of standards-based software components. Such systems are independent of the underlying software. They can run on various operating systems, and can use various communications protocols. Ensuring data persistence is a major challenge in designing a mobile storage system because of various reasons.
  • 2. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure www.theijes.com The IJES Page 50 Due to their arbitrary movement patterns, mobile devices can leave or join networks non- deterministically, making data persistence challenging. Mobile devices can shut down or fail unexpectedly. Also, mobile devices may delete some cached data contents due to lack of sufficient storage space. Wireless communications among mobile devices are error-prone. Furthermore a lot of applications in this situations are time dependant and, therefore, their connections be supposed to be perform not simply appropriately, however as well contained by their time limits. In a Distributed Database System, Data is repeatedly replicated to get better consistency and accessibility. Though one significant subject to be measured as replicating Data is the accuracy of the Replicated Data. As Nodes in MANETS are Mobile and contain some degree of Power, disentanglement might happen often, cause a group of Network separation. Mobile hosts cannot access data, which is obtainable in Mobile hosts in one division in another detachment. The subject connected to Data Replication in MANETS Databases is as. Server Power Consumption: Servers in MANETS run on battery Power. If Servers have a small Power remains and if it replicated with numerous often-contact Data objects, then the numerous Data access requests for these hot Data will consume its Power. Server Mobility: Because of its Mobility, Servers may from time to time shift to a position where they might not be getting in touch with by any other Servers or Clients. Client Mobility: Client which inquiry Servers for Information is as well Mobile. Clients more often than not launch their contacts to the adjacent Servers to obtain a rapid reaction. The choice to Replicate Data substance at exacting Servers might be found on the way in frequencies of Data matter from those precise Servers. Therefore, the judgment to Replicate Data stuff at suitable Servers has to be dynamic and found on the current Network topology Client Power: Clients in MANETS also run on battery Power. If Clients stay excessively extended for its communications fallout, it may drop its Power quickly. The Replication technique ought to be capable to Replicate Data matter at suitable Servers in such a way that a Client may be capable to contact its demanded Data substances from its adjacent Server, which has the smallest amount workload. Time Critical Applications: Numerous MANET applications, like rescue Networks, military processes, are time dependant. Data Replication is supposed to be used to progress Data ease of access and performance of the System, thus falling the time to perform communications. Dealings with short time limit ought to be sent to the nearest Server, which contain the smallest amount workload for their implementation. II. LITERATURE SURVEY a) Wangand Li [14] proposed In order to minimize the communication overhead and achieve efficient data retrieval in data-centric mobile environments, we propose a fully distributed neighbourhood prediction scheme that utilizes past node trajectory information to determine the near likely node in the future as the best content distribute As in any traditional distributed setting, a set of runtime algorithms to ensure the availability of centralized services to all mobile nodes in networks that are frequently partitioned and is a non-power-aware, non-real-time-aware, and partition-aware system. An ideal MANET data replication strategy should be power- aware, real-time-aware, and partition-aware. Phoenix, as an underlying storage layer can help reduce the complexity of MANET databases by handling the node mobility and communication failures in a power-efficient manner, while guaranteeing the level of redundancy. b) The ―classic‖ academic approach to providing highly available data objects, the state-machine approach , consists in synchronizing a set of server replicas, each hosting a copy of the data, to handle all updates and queries in the same way (―write all – read one‖). This approach provides perfect guarantees in theory, yet is expensive to implement even in wired networks. In particular, the atomic broadcast protocol ensures that each server replica obtains all updates and in the same order, but it comes with a prohibitively large overhead. Clearly, with an underlying highly dynamic adhoc network, the synchronism required for state machine replication becomes un-practicable. Even with weaker consistency guarantees (e.g., without ordering guarantees), state machine replication leads to poor performance in adhoc networks. Further sacrificing safety guarantees such as atomicity through the use of a probabilistic dissemination of updates (e.g., probabilistic broadcast ) is indeed an option, yet the incurred overhead is not low enough to address a broad application context. A more drastic shift seems to be necessary. c) Distributed storage systems such as OceanStore use Distributed Hash Tables (DHT) to manage the mapping from a collection of keys to values autonomously without any central control. DHT-based systems [5], [6], [7],
  • 3. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure www.theijes.com The IJES Page 51 [8],attempt to reduce the latency among nodes on wide-area networks by constantly updating their routing tables to improve the lookup speed. Phoenix, on the other hand, focuses on maintaining the desired number of copies of the data items in autonomous mobile nodes within a geographic region. d) By introducing probabilities for the intersection of individual quorums, the construction rules for these quorums are relaxed, and more freedom is left for trading protocol overhead for reliability. As this smoother tradeoff has constituted the driving force behind probabilistic quorum systems, it also turns out that the resulting reduced determinism makes such an approach more viable than a strict approach for ad hoc networks. Problem for providing reliable storage in MANETs using probabilistic quorum system [9]. e) The Random Waypoint Mobility Model is used in many prominent simulation studies of ad hoc network protocols. For example a conference setting or museum. The Gauss-Markov Mobility Model also provides movement patterns that one might expect in the real-world, if appropriate parameters are chosen. In addition, this method also forces MNs to keep away from the edges of the simulation area While the Probabilistic Random Walk Mobility Model also provides movement patterns that one might expect in the real-world, choosing appropriate parameters for the probability matrix may be difficult. The Manhatten Model appears to create realistic movements for a section of a city since it severely restricts the travelling behaviour of MNs, MNs do not have the ability to roam freely without regard to obstacles and other traffic regulations. The Reference Point Group Mobility Model (RPGM) is a generic method for handling group mobility. These are the models proposed for mobile Adhoc networks to aid in designing efficient communication protocols for networks [10],[11]. f) Phoenix, on the other hand, is more deterministic in nature. Its primary goal is to maintain the desired level of data storage redundancy fairly accurately. While Phoenix does not support data updates directly, MANET databases that require data replication [12] can be built on top of Phoenix and rely on its protocol to handle issues related to node mobility and unreliable communication channels. g) Using error correction coding in distributed systems for fault tolerance has not been widely applied in multi- agent systems. Current multi-agent platforms like JADE and COUGAAR use replication. Replication needs a lot of storage and bandwidth support, and information theoretic results tell us that we can do better. Some information theoretic ideas are used by the CFS cooperative storage and the OceanStore. In [13], Miletic and Dewilde consider reliability of a distributed storage system using an information-theoretic approach. h) The push-pull method for data dissemination through the three way handshake of advertisement-request-code has been used previously in sensor networks with sensed data taking the place of code. Protocols such as SPIN [3] and SPMS [4] rely on the advertisement and the request packets being much smaller than the data packets and the redundancy in the network deployments which make several nodes disinterested in any given advertisement. However, in the data dissemination protocols, there is only suppression of the requests and the data sizes are much smaller than the entire binary code images. i) Reliable multicast in unreliable environments, such as ad-hoc networks, can be achieved by epidemic multicast protocols based on each node gossiping the message it received to a subset of neighbours [2]. These protocols give probabilistic guarantee for the update to reach all the group members. The probability is monotonically increasing with the fan-out of each node (the number of neighbours to gossip to) and the quiescence threshold (the time after which a node will stop gossiping to its neighbours). By increasing the quiescence threshold, the reliability can be made to approach 2, which is the basic premise behind all the epidemic based code update protocols in sensor networks – Deluge, MNP, and Freshet. j) Various models[15] for mobility are 1. Random Waypoint Mobility Model: A model that includes pause times between changes in destination and speed. 2. Reference Point Group Model: A model that forces MNs to travel to according to the speed and direction of group leader 3. City Section Based Models: Freeway Mobility model where A node here moves in lanes as in case of city and its velocity depends on previous one and in case of Manhattan Mobility model where Nodes are free to move in any direction 4 Gauss-Markov Mobility Model: A model that uses one tuning parameter to vary the degree of randomness in the mobility pattern. 5. A Probabilistic Version of the Random Walk Mobility Model: A model that utilizes a set of probabilities to determine the next position of an MN.
  • 4. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure www.theijes.com The IJES Page 52 III. EXISTING SYSTEM Fig 1: Flow chart showing the overview of phoenix. The shaded and unshaded blocks are the winner and the follower respectively. When a node joins the network, it may or may not have information blocks. Each node starts an advertisement timer asynchronously—independent of the advertisement timers of other nodes. If the node does not receive any advertisement message before its advertisement timer expires, it assumes that it has won the round and broadcasts an advertisement for one of the blocks (say b1) that it currently possesses. If the node hears an advertisement message before its advertisement timer fires, it assumes that it has lost the current round and becomes a follower node. The follower node checks if it has b1—the block advertised by the winner node. If so, it starts a reply timer and when that timer expires, it broadcasts an advertisement for b1, if it has heard less than K advertisements for b1 in the current round. If it has heard K or more advertisements for b1, it deletes b1 because it knows that there are K or more nodes storing the copies of b1. On the other hand, if the follower node does not have b1, it starts a request timer and when that timer expires, it checks if it has heard K or more advertisements for b1. If so, it knows that there are K copies of b1 and, thus, does nothing and starts a new round. If it does not hear K or more advertisements for b1, it suspects that there may be less than K copies of b1 in the network. At this point, the node does not conclude that there are less than K copies because it may have missed some advertisements due to wireless communication failures. To ensure that there are indeed less than K copies of b1, it goes to the verification step, where it communicates with its neighbors to determine if they have b1. After the verification step, if the node finds that there are K or more copies of b1, it does nothing and starts a new round. Otherwise, it goes to the data download state, where it downloads b1 from one of its neighbors. Then, the node starts a new round. IV. PROPOSED SYSTEM Node1 With All 10 Blocks Node 2 With 3 Blocks Node 3 with First 4 Blocks Node 4 with block no 5,6 Internet or Network Node 8 with block no 7,8,9,10 Node 7 with block no 7,8,9,10 Node 6 with block no 5,6 Node 5 with First 4 Blocks KDC (Key Distribution Center) Fig2: content distribution among several nodes
  • 5. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure www.theijes.com The IJES Page 53 The above diagram shows the practical implementation of our proposed approach with contents distributed among several nodes. In this approach we design a content distribution approach, for which we propose an algorithm called phoenix which is described below We are enhancing the application by proving the security to the algorithm by introducing key distribution center. KDC provides the service of generating and distribution public/ private keys to the set of group of nodes in the network. Each node when joining the group contacts the key distribution center and get the private key for the group using RSA Algorithm (Chinese Reminder Theorem).Then the node performs the following initiation. Functional Requirements The functional requirements for a system describe what the system should do. These requirements depend on the type of software being developed, the expected users of the software and the general approach taken by the organization when writing requirements. When expressed as user requirements, the requirements are usually described in a fairly abstract way. However, functional system requirements describe the system function in detail, its inputs and outputs, exceptions, and so on. Functional requirements are as follows:  The proposed system should ensure the longevity of the stored data, even in the presence of autonomous node mobility.  The protocol proposed should scale well with the number of mobile devices and cached information content.  The protocol should be asynchronous Non-Functional Requirement Non-functional requirements, as the name suggests, are requirements that are not directly concerned with the specific functions delivered by the system. They may relate to emergent system properties such as reliability, response time and store occupancy. Alternatively, they may define constraints on the system such as the capabilities of I/O devices and the data representations used in system interfaces.  All nodes should be within the communication range of each other.  Does not require central control or global knowledge about the current network conditions. V. CONCLUSION To improve network connectivity, researchers have proposed many mobility prediction schemes to predict the future availability of wireless links, for the purpose of building more stable end-to-end connections. In contrast, there are fewer studies of the effect of dynamic network topology on application-level issues, such as the provisioning of centralized service in wireless ad-hoc networks. Although distributed applications are better suited for the adhoc network due to its peer-to-peer architecture, important network applications and services such as web servers, location information databases and network services. The main appeal of the wireless cellular and ad-hoc networks is that they allow both user mobility and unthread connectivity. However, user mobility poses significant challenges to network operations such as routing, resource management, and Quality of Service (QoS) provisioning. Node mobility leads to frequent disconnections of wireless links, hence the network topology changes dynamically. We propose a fully distributed grouping algorithm for a node to identify its stable group the group of nodes it has reliable connectivity with at run-time, using only local observations. REFERENCES [1] Jun Luo, JeanPierre Hubaux, Patrick Th. Eugster, School of Computer and Communication Sciences Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland "PAN: Providing Reliable Storage in Mobile Ad Hoc Networks with Probabilistic Quorum Systems" June 1–3, 2003, 5005-67322 [2] J. Luo, P. T. Eugster, and J. P. Hubaux, "Route driven gossip: probabilistic reliable multicast in ad hoc networks," at the Twenty- Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 2229-2239, 2003. [3] J. Kulik, W. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor networks," Wireless Networks, vol. 8, no. 2/3, pp. 169-185, 2002. [4] G. Khanna, S. Bagchi, and Y-S. Wu, "Fault tolerant energy aware data dissemination protocol in sensor networks," at the International Conference on Dependable Systems and Networks, pp. 795-804, 2004. [5] S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu, ―OpenDHT: A Public DHT Service and Its Uses,‖ ACM SIGCOMM Computer Comm. Rev., vol. 35, pp. 73-84, 2005. [6] A. Rowstron and P. Druschel, ―Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems,‖ Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms Heidelberg (Middleware ’01), pp. 329-350, 2001. [7] I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, ―Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,‖ ACM SIGCOMM Computer Comm. Rev., vol. 31, no.4, pp. 149-160, 2001 [8] B. Zhao, J. Kubiatowicz, and A. Joseph, ―Tapestry: A Fault-Tolerant Wide-Area Application Infrastructure,‖ ACM SIGCOMM Computer Comm. Rev., vol. 32, p. 81, 2002. [9] D. Malkhi, M.K. Reiter, A. Wool, and R.N. Wright, ―Probabilistic Quorum Systems,‖ Information and Computation, vol. 170, no. 2,pp. 184-206, 2001.
  • 6. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure www.theijes.com The IJES Page 54 [10] T. Camp, J. Boleng, and V. Davies, ―A Survey of Mobility Models for Adhoc Networks,‖ Wireless Comm. and Mobile Computing, vol. 2, pp. 483-502, 2002. [11] X. Hong, M. Gerla, G. Pei, and C. Chiang, ―A Group Mobility Model for Ad Hoc Wireless Networks,‖ Proc. ACM Second Int’l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999. [12] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, ―A Survey of Data Replication Techniques for Mobile Ad Hoc Network Databases,‖ The VLDB J., vol. 17, no. 5, pp. 1143-1164, 2008. [13] F. Miletic and P. Dewilde, ―Data Storage in Unreliable Multi-Agent Networks,‖ Proc. Conf. Autonomous agents and Multiagent Systems, 2005. [14] K. Wang and B. Li, ―Efficient and Guaranteed Service Coverage in Partitionable Mobile Ad-Hoc Networks,‖ Proc. IEEE INFOCOM,2002. [15] Tracy Camp ,Jeff Boleng, Vanessa Davies, ―A Survey of Mobility Models for Ad Hoc Network Research‖, Wireless Communication & Mobile Computing (WCMC) Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, pp. 483-502, 2002.