The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
This document proposes an Optimal Data Replication Scheme (ODRS) to improve data availability, reduce query delay, and increase hit ratio in mobile ad hoc networks (MANETs). In MANETs, frequent node and link failures can cause network partitions that decrease data access performance. ODRS aims to address this issue through proactive data replication across network partitions. It considers factors like node mobility, power consumption, and resource availability to determine what data to replicate, where to place replicas, and how to access and synchronize replicated data in order to optimize data availability and query efficiency in the dynamic MANET environment. The proposed scheme is evaluated through simulation to validate that it can achieve higher data availability, lower query delay, and increased
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...ijgca
Monitoring in a grid environment involves the analysis of all resource metrics and network metrics. Monitoring the resource metrics helps the grid middle ware to decide which job to be
submitted to which resource. Decision for submitting a job will be better along with the consideration of the network metrics. Tuning of the network metrics is also made if the performance degrades.
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...Eswar Publications
This document summarizes and compares various hierarchical routing protocols for wireless sensor networks with mobile sinks. It describes protocols that use grids, clustering, trees, backbones, and environmental structures to create virtual hierarchies in the network. The protocols are evaluated based on factors like overhead, support for multiple sinks, data aggregation ability, and type of virtual structure. Some examples of protocols discussed are TTDD, GBEER, HCDD, EEMSRA, and MSRP which use grids, clustering, or trees to organize the network and route data to a mobile sink efficiently.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
IRJET - Efficient Load Balancing in a Distributed EnvironmentIRJET Journal
This document discusses load balancing algorithms for distributed computing environments. It begins by defining load balancing and describing its importance in distributed systems for optimizing resource utilization and system performance. Several static and dynamic load balancing algorithms are then summarized, including round robin, random, min-min, and max-min algorithms. The document also outlines key issues in load balancing, advantages, metrics for evaluating algorithms, and provides more detailed descriptions of 13 load balancing algorithms.
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
This document proposes an energy efficient routing algorithm for wireless sensor networks that uses grid clustering, closeness centrality for cluster head selection, and bacterial foraging optimization (BFO) for routing. Grid clustering is used to divide the sensor network area into grids, with each grid forming a cluster. Closeness centrality, which is based on node distance, is used to select cluster heads at optimal locations to minimize energy consumption. BFO, a nature-inspired optimization algorithm, is used for routing by considering energy and distance in its fitness function. Simulation results show the proposed algorithm outperforms existing algorithms in terms of network lifetime and stability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document presents a comparative study of flat-based/data-centric wireless sensor network (WSN) specific routing protocols. It first provides background on data-centric approaches in WSNs and discusses some popular flat-based/data-centric routing protocols, including Directed Diffusion, Minimum Cost Forwarding Algorithm (MCFA), Threshold sensitive Energy Efficient sensor Network protocol (TEEN), Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol (APTEEN), Energy Aware Data (EAD) Centric Routing Protocol, RUMOR Routing, Sensor Protocols for Information via Negotiation (SPIN), Constrained Anisotropic Diffusion Routing (CADR), COUGAR,
ODRS: Optimal Data Replication Scheme for Time Efficiency In MANETsIOSR Journals
This document proposes an Optimal Data Replication Scheme (ODRS) to improve data availability, reduce query delay, and increase hit ratio in mobile ad hoc networks (MANETs). In MANETs, frequent node and link failures can cause network partitions that decrease data access performance. ODRS aims to address this issue through proactive data replication across network partitions. It considers factors like node mobility, power consumption, and resource availability to determine what data to replicate, where to place replicas, and how to access and synchronize replicated data in order to optimize data availability and query efficiency in the dynamic MANET environment. The proposed scheme is evaluated through simulation to validate that it can achieve higher data availability, lower query delay, and increased
ENERGY EFFICIENCY IN FILE TRANSFER ACROSS WIRELESS COMMUNICATION Editor IJCATR
The key idea of our Energy Efficiency management is to use the exchange between energy consumption vs the gain in responsibility, timeliness, and security to maximize the system helpful time period. we tend to formulate the exchange as Associate in Nursing optimization downside for dynamically crucial the most effective redundancy level to use to multipath routing for intrusion tolerance so the question response success likelihood is maximized whereas prolonging the helpful time period. Moreover, we think about this optimization downside for the case during which a voting-based distributed intrusion detection formula is applied to sight and evict malicious nodes during a HWSN. we over see to develop a novel likelihood model to investigate the most effective redundancy level in terms of path redundancy and supply redundancy, further because the best intrusion detection settings in terms of the amount of voters and the intrusion invocation interval below that the time period of a HWSN is maximized. we over see to then apply the analysis results obtained to the planning of a dynamic redundancy management formula to identify and apply the most effective style parameter settings at runtime in response to environmental changes, to maximize the HWSN lifetime.
AN ALTERNATE APPROACH TO RESOURCE ALLOCATION STRATEGY USING NETWORK METRICSIN...ijgca
Monitoring in a grid environment involves the analysis of all resource metrics and network metrics. Monitoring the resource metrics helps the grid middle ware to decide which job to be
submitted to which resource. Decision for submitting a job will be better along with the consideration of the network metrics. Tuning of the network metrics is also made if the performance degrades.
A Survey on the Mobile Sink Hierarchical Routing Protocols in the Wireless Se...Eswar Publications
This document summarizes and compares various hierarchical routing protocols for wireless sensor networks with mobile sinks. It describes protocols that use grids, clustering, trees, backbones, and environmental structures to create virtual hierarchies in the network. The protocols are evaluated based on factors like overhead, support for multiple sinks, data aggregation ability, and type of virtual structure. Some examples of protocols discussed are TTDD, GBEER, HCDD, EEMSRA, and MSRP which use grids, clustering, or trees to organize the network and route data to a mobile sink efficiently.
DESIGNING AN ENERGY EFFICIENT CLUSTERING IN HETEROGENEOUS WIRELESS SENSOR NET...IJCNCJournal
Designing an energy-efficient scheme in a Heterogeneous Wireless Sensor Network (HWSN) is a critical
issue that degrades the network performance. Recharging and providing security to the sensor devices is
very difficult in an unattended environment once the energy is drained off. A Clustering scheme is an
important and suitable approach to increase energy efficiency and transmitting secured data which in turn
enhances the performance in the network. The proposed algorithm Energy Efficient Clustering (EEC)
works for optimum energy utilization in sensor nodes. The algorithm is proposed by combining the
rotation-based clustering and energy-saving mechanism for avoiding the node failure and prolonging the
network lifetime. This shows MAC layer scheduling is based on optimum energy utilization depending on
the residual energy. In the proposed work, a densely populated network is partitioned into clusters and all
the cluster heads are formed at a time and selected on rotation based on considering the highest energy of
the sensor nodes. Other cluster members are accommodated in a cluster based on Basic Cost Maximum
flow (BCMF) to allow the cluster head for transmitting the secured data. Carrier Sense Multiple Access
(CSMA), a contention window based protocol is used at the MAC layer for collision detection and to
provide channel access prioritization to HWSN of different traffic classes with reduction in End to End
delay, energy consumption, and improved throughput and Packet delivery ratio(PDR) and allowing the
cluster head for transmission without depleting the energy. Simulation parameters of the proposed system
such as Throughput, Energy, and Packet Delivery Ratio are obtained and compared with the existing
system.
IRJET - Efficient Load Balancing in a Distributed EnvironmentIRJET Journal
This document discusses load balancing algorithms for distributed computing environments. It begins by defining load balancing and describing its importance in distributed systems for optimizing resource utilization and system performance. Several static and dynamic load balancing algorithms are then summarized, including round robin, random, min-min, and max-min algorithms. The document also outlines key issues in load balancing, advantages, metrics for evaluating algorithms, and provides more detailed descriptions of 13 load balancing algorithms.
Energy Efficient Grid based Routing Algorithm using Closeness Centrality and ...IRJET Journal
This document proposes an energy efficient routing algorithm for wireless sensor networks that uses grid clustering, closeness centrality for cluster head selection, and bacterial foraging optimization (BFO) for routing. Grid clustering is used to divide the sensor network area into grids, with each grid forming a cluster. Closeness centrality, which is based on node distance, is used to select cluster heads at optimal locations to minimize energy consumption. BFO, a nature-inspired optimization algorithm, is used for routing by considering energy and distance in its fitness function. Simulation results show the proposed algorithm outperforms existing algorithms in terms of network lifetime and stability.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
This document presents a comparative study of flat-based/data-centric wireless sensor network (WSN) specific routing protocols. It first provides background on data-centric approaches in WSNs and discusses some popular flat-based/data-centric routing protocols, including Directed Diffusion, Minimum Cost Forwarding Algorithm (MCFA), Threshold sensitive Energy Efficient sensor Network protocol (TEEN), Adaptive Periodic Threshold sensitive Energy Efficient sensor Network protocol (APTEEN), Energy Aware Data (EAD) Centric Routing Protocol, RUMOR Routing, Sensor Protocols for Information via Negotiation (SPIN), Constrained Anisotropic Diffusion Routing (CADR), COUGAR,
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
The document is a thesis submitted by Devdutta Chakrabarti to the department of computer science and engineering at Gurunanak Institute of Technology. The thesis proposes secure and reliable routing protocols for heterogeneous multihop wireless networks. It presents E-STAR, a payment and trust-based routing architecture, and two routing protocols - shortest reliable route and best available route. E-STAR aims to enhance route reliability and stability by rewarding nodes for forwarding packets and punishing nodes that report incorrect energy levels. The document outlines the network and adversary models, payment and trust systems, route establishment phase, security analysis and concludes that E-STAR can secure payment/trust calculations and stimulate nodes to maintain route stability.
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
This document summarizes a research paper on using mobile communication to improve energy efficiency in data-intensive wireless sensor networks. The paper proposes using mobile relay nodes that move to optimize positions for transmitting data from sensor sources to a base station. An algorithm is presented that iteratively relocates the mobile relay nodes to minimize the total energy used for both wireless transmission and node movement. The algorithm finds optimal positions for relay nodes within a fixed routing tree topology without changing the tree structure. This approach aims to reduce energy consumption in a holistic way compared to other mobility approaches.
This document discusses techniques for data dissemination and caching in wireless sensor networks. It aims to reduce energy consumption by minimizing unnecessary data transmission through cooperative caching. Sensor nodes can store data in their local cache or use nearby nodes' caches through cooperative caching. One node close to the sink is selected as the Immediate Dissemination Node to cache data, while other nodes along the path act as dissemination nodes. By caching data closer to the sink, this approach reduces network traffic and prolongs the battery life of sensor nodes. The paper also reviews several routing protocols and discusses how data negotiation, change expectancy, and discarding duplicate data can further improve energy efficiency in wireless sensor networks.
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...IOSR Journals
This document discusses energy saving techniques in peer-to-peer wireless sensor networks through the use of data compression. It begins by introducing wireless sensor networks and their energy constraints. It then discusses how compression can reduce energy consumption by decreasing transmission time. Different compression techniques like LZO, Zlib, and Bzip2 are described. The document proposes using Adaptive Compression Environment to automatically select the best compression technique based on network conditions. It presents an algorithm for compressing data at the sender, transmitting it in chunks, and decompressing it at the receiver. The conclusion states that compression technologies can help save sensor energy in peer-to-peer networks and that more advances will optimize this solution.
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
The document discusses an energy efficient and secure data aggregation protocol for wireless sensor networks called the Trusted Third Party (TTP) protocol. It aims to overcome Byzantine attacks, where compromised nodes inject false data. The key aspects are:
1) Sensor nodes are clustered, with each cluster having an aggregator node to collect and aggregate data from members.
2) When a malicious node tries to inject false data or steal real data, a trusted third party (TTP) detects this and changes the authentication IDs for that cluster quickly, confusing the malicious node.
3) The protocol has three phases - cluster formation, data transmission using a distance-based routing protocol to minimize energy, and using the TTP to provide
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
Many real-time systems are naturally distributed and these distributed systems require not only highavailability
but also timely execution of transactions. Consequently, eventual consistency, a weaker type of
strong consistency is an attractive choice for a consistency level. Unfortunately, standard eventual
consistency, does not contain any real-time considerations. In this paper we have extended eventual
consistency with real-time constraints and this we call real-time eventual consistency. Followed by this new
definition we have proposed a method that follows this new definition. We present a new algorithm using
revision diagrams and fork-join data in a real-time distributed environment and we show that the proposed
method solves the problem.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
The document discusses transfer reliability and congestion control strategies in opportunistic networks. It begins by stating that opportunistic networks have unpredictable node contacts and rarely have complete end-to-end paths. It then discusses how modified TCP protocols are ineffective for these networks and they require different approaches than intermittently connected networks. The document surveys proposals for transfer reliability using hop-by-hop custody transfer and end-to-end receipts. It also categorizes storage congestion control based on single or multiple message copies. It identifies open research issues including replication management and drop policies for multiple copies.
Data aggregation in important issue in WSN’s. Because with the help of data aggregation; we are
reduce energy consumption in the network. In the Ad-hoc sensor network have the most challenging task
is to maintain a life time of the node. due to efficient data aggregation increase the life of the network. In
this paper, we are going to provide the information about the type of the network and which data
aggregation algorithm is best. In big scale sensor network, energy economical, data collection and query
distribution in most important.
Keywords — data aggregation; wireless sensor network
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
Survey on replication techniques for distributed systemIJECEIAES
Distributed systems mainly provide access to a large amount of data and computational resources through a wide range of interfaces. Besides its dynamic nature, which means that resources may enter and leave the environment at any time, many distributed systems applications will be running in an environment where faults are more likely to occur due to their ever-increasing scales and the complexity. Due to diverse faults and failures conditions, fault tolerance has become a critical element for distributed computing in order for the system to perform its function correctly even in the present of faults. Replication techniques primarily concentrate on the two fault tolerance manners precisely masking the failures as well as reconfigure the system in response. This paper presents a brief survey on different replication techniques such as Read One Write All (ROWA), Quorum Consensus (QC), Tree Quorum (TQ) Protocol, Grid Configuration (GC) Protocol, Two-Replica Distribution Techniques (TRDT), Neighbour Replica Triangular Grid (NRTG) and Neighbour Replication Distributed Techniques (NRDT). These techniques have its own redeeming features and shortcoming which forms the subject matter of this survey.
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS cscpconf
Initially wireless networks were fully infrastructure based and hence imposed the necessity to
install base station. Base station leads to single point of failure and causes scalability problems.
With the advent of mobile adhoc networks, these problems are mitigated, by allowing certain
mobile nodes to form a dynamic and temporary communication network without any preexisting
infrastructure. Caching is an important technique to enhance the performance in any network. Particularly, in MANETs, it is important to cache frequently accessed data not only to reduce average latency and wireless bandwidth but also to avoid heavy traffic near the data centre. With data being cached by mobile nodes, a request to the data centre can easily be serviced by a nearby mobile node instead of the data centre alone. In this paper we propose a system , Time Index Based Approach that focuses on providing recent data on demand basis. In this system, the data comes along with a time stamp. In our work we propose three policies namely Item Discovery, Item Admission and Item Replacement, to provide data availability even with limited resources. Data consistency is ensured here since if the mobile client receives the same data item with an updated time, the previous content along with time is replaced to provide only recent data. Data availability is promised by mobile nodes, instead of the data server. We enhance the space availability in a node by deploying automated replacement policy.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Efficiency enhancement using optimized static scheduling technique in TSCH ne...IJECEIAES
In recent times, the reliable and real-time data transmission becomes a mandatory requirement for various industries and organizations due to the large utilization of Internet of Things (IoT) devices. However, the IoT devices need high reliability, precise data exchange and low power utilization which cannot be achieved by the conventional Medium Access Control (MAC) protocols due to link failures and high interferences in the network. Therefore, the Time-Slotted Channel Hopping (TSCH) networks can be used for link scheduling under the IEEE 802.15.4e standard. In this paper, we propose an Optimized Static Scheduling Technique (OSST) for the link scheduling in IEEE 802.15.4e based TSCH networks. In OSST the link schedule is optimized by considering the packet latency information during transmission by checking the status of the transmitted packets as well as keeping track of the lost data packets from source to destination nodes. We evaluate the proposed OSST model using 6TiSCH Simulator and compare the different performance metrics with Simple distributed TSCH Scheduling.
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
A survey of real-time routing protocols For wireless sensor networksijcses
This document summarizes a survey of real-time routing protocols for wireless sensor networks. It discusses several existing real-time routing protocols, including AODV, DSR, RAP, SPEED, and MMSPEED. For each protocol, it describes the key mechanisms, advantages, and disadvantages. It focuses on factors like end-to-end delay, energy consumption, mobility, scalability, and challenges for future research in real-time routing protocols for wireless sensor networks. The document provides a comparative analysis of the protocols to highlight their strengths and weaknesses in meeting the demands of real-time applications.
The document is a thesis submitted by Devdutta Chakrabarti to the department of computer science and engineering at Gurunanak Institute of Technology. The thesis proposes secure and reliable routing protocols for heterogeneous multihop wireless networks. It presents E-STAR, a payment and trust-based routing architecture, and two routing protocols - shortest reliable route and best available route. E-STAR aims to enhance route reliability and stability by rewarding nodes for forwarding packets and punishing nodes that report incorrect energy levels. The document outlines the network and adversary models, payment and trust systems, route establishment phase, security analysis and concludes that E-STAR can secure payment/trust calculations and stimulate nodes to maintain route stability.
Iaetsd use of mobile communication in data-intensiveIaetsd Iaetsd
This document summarizes a research paper on using mobile communication to improve energy efficiency in data-intensive wireless sensor networks. The paper proposes using mobile relay nodes that move to optimize positions for transmitting data from sensor sources to a base station. An algorithm is presented that iteratively relocates the mobile relay nodes to minimize the total energy used for both wireless transmission and node movement. The algorithm finds optimal positions for relay nodes within a fixed routing tree topology without changing the tree structure. This approach aims to reduce energy consumption in a holistic way compared to other mobility approaches.
This document discusses techniques for data dissemination and caching in wireless sensor networks. It aims to reduce energy consumption by minimizing unnecessary data transmission through cooperative caching. Sensor nodes can store data in their local cache or use nearby nodes' caches through cooperative caching. One node close to the sink is selected as the Immediate Dissemination Node to cache data, while other nodes along the path act as dissemination nodes. By caching data closer to the sink, this approach reduces network traffic and prolongs the battery life of sensor nodes. The paper also reviews several routing protocols and discusses how data negotiation, change expectancy, and discarding duplicate data can further improve energy efficiency in wireless sensor networks.
Energy saving in P2P oriented Wireless Sensor Network (WSN) using the approac...IOSR Journals
This document discusses energy saving techniques in peer-to-peer wireless sensor networks through the use of data compression. It begins by introducing wireless sensor networks and their energy constraints. It then discusses how compression can reduce energy consumption by decreasing transmission time. Different compression techniques like LZO, Zlib, and Bzip2 are described. The document proposes using Adaptive Compression Environment to automatically select the best compression technique based on network conditions. It presents an algorithm for compressing data at the sender, transmitting it in chunks, and decompressing it at the receiver. The conclusion states that compression technologies can help save sensor energy in peer-to-peer networks and that more advances will optimize this solution.
IRJET- Energy Efficiency and Security based Multihop Heterogeneous Trusted Th...IRJET Journal
The document discusses an energy efficient and secure data aggregation protocol for wireless sensor networks called the Trusted Third Party (TTP) protocol. It aims to overcome Byzantine attacks, where compromised nodes inject false data. The key aspects are:
1) Sensor nodes are clustered, with each cluster having an aggregator node to collect and aggregate data from members.
2) When a malicious node tries to inject false data or steal real data, a trusted third party (TTP) detects this and changes the authentication IDs for that cluster quickly, confusing the malicious node.
3) The protocol has three phases - cluster formation, data transmission using a distance-based routing protocol to minimize energy, and using the TTP to provide
Improved Development of Energy Efficient Routing Algorithm for Privacy Preser...IRJET Journal
This document proposes an algorithm to improve energy efficiency and privacy preservation for the sink node in wireless sensor networks. The algorithm uses node clustering, where sensor nodes are grouped into clusters with a cluster head node. Data is routed from cluster members to their cluster head, and then from cluster heads to the sink node. The algorithm elects a subset of cluster heads to broadcast data, obscuring the location of the sink node and distributing energy usage across nodes. Simulations analyze how effectively this approach preserves sink node anonymity while limiting energy depletion across varying network conditions.
Performance Analysis of Routing Protocols of Wireless Sensor NetworksDarpan Dekivadiya
The document summarizes different types of routing protocols that can be used in wireless sensor networks. It categorizes the protocols based on their mode of functioning, participation style of nodes, and network structure. Some key routing protocols discussed include LEACH, which is a proactive clustering protocol, SPIN that uses direct communication, and TEEN which is a reactive clustering protocol. The document also discusses challenges in routing for wireless sensor networks given the constraints of sensor nodes.
EFFICIENT REBROADCASTING USING TRUSTWORTHINESS OF NODE WITH NEIGHBOUR KNOWLED...ijiert bestjournal
Mobile Ad hoc network is an infrastructure less communication network with limited resources. To maintain virtual
infrastructure for communication broadcasting mechanisms is used. Due to lack of energy efficiency in Mobile Ad
hoc network, there is a need to develop an efficient broadcasting model which enhances energy efficiency. Also
nodes with malicious behaviour cause an internal threat that disobeys the standard and degrades the performance of
routing protocols. This paper introduced an enhanced rebroadcasting algorithm, where rebroadcasting decision for
next hop is immediate or delayed on the basis of trust value and energy level of particular node. This approach helps
to decrease number of rebroadcast, energy consumption and also enhances security. The decision is made with trust
value associated with node, their remaining energy and total number of uncovered nodes.
Many real-time systems are naturally distributed and these distributed systems require not only highavailability
but also timely execution of transactions. Consequently, eventual consistency, a weaker type of
strong consistency is an attractive choice for a consistency level. Unfortunately, standard eventual
consistency, does not contain any real-time considerations. In this paper we have extended eventual
consistency with real-time constraints and this we call real-time eventual consistency. Followed by this new
definition we have proposed a method that follows this new definition. We present a new algorithm using
revision diagrams and fork-join data in a real-time distributed environment and we show that the proposed
method solves the problem.
Secured client cache sustain for maintaining consistency in manetseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Transfer reliability and congestion control strategies in opportunistic netwo...IEEEFINALYEARPROJECTS
The document discusses transfer reliability and congestion control strategies in opportunistic networks. It begins by stating that opportunistic networks have unpredictable node contacts and rarely have complete end-to-end paths. It then discusses how modified TCP protocols are ineffective for these networks and they require different approaches than intermittently connected networks. The document surveys proposals for transfer reliability using hop-by-hop custody transfer and end-to-end receipts. It also categorizes storage congestion control based on single or multiple message copies. It identifies open research issues including replication management and drop policies for multiple copies.
Data aggregation in important issue in WSN’s. Because with the help of data aggregation; we are
reduce energy consumption in the network. In the Ad-hoc sensor network have the most challenging task
is to maintain a life time of the node. due to efficient data aggregation increase the life of the network. In
this paper, we are going to provide the information about the type of the network and which data
aggregation algorithm is best. In big scale sensor network, energy economical, data collection and query
distribution in most important.
Keywords — data aggregation; wireless sensor network
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
The Information-Centric Network (ICN) is a future internet architecture with efficient content retrieval and distribution. Named Data Networking (NDN) is one of the proposed architectures for ICN. NDN’s innetwork caching improves data availability, reduce retrieval delays, network load, alleviate producer load, and limit data traffic. Despite the existence of several caching decision algorithms, the fetching and distribution of contents with minimum resource utilization remains a great challenge. In this paper, we introduce a new cache replacement strategy called Enhanced Time and Frequency Cache Replacement strategy (ETFCR) where both cache hit frequency and cache retrieval time are used to select evicted data chunks. ETFCR adds time cycles between the last two requests to adjust data chunk’s popularity and cache hits. We conducted extensive simulations using the ccnSim simulator to evaluate the performance of ETFCR and compare it to that of some well-known cache replacement strategies. Simulations results show that ETFCR outperforms the other cache replacement strategies in terms of cache hit ratio, and lower content retrieval delay.
Survey on replication techniques for distributed systemIJECEIAES
Distributed systems mainly provide access to a large amount of data and computational resources through a wide range of interfaces. Besides its dynamic nature, which means that resources may enter and leave the environment at any time, many distributed systems applications will be running in an environment where faults are more likely to occur due to their ever-increasing scales and the complexity. Due to diverse faults and failures conditions, fault tolerance has become a critical element for distributed computing in order for the system to perform its function correctly even in the present of faults. Replication techniques primarily concentrate on the two fault tolerance manners precisely masking the failures as well as reconfigure the system in response. This paper presents a brief survey on different replication techniques such as Read One Write All (ROWA), Quorum Consensus (QC), Tree Quorum (TQ) Protocol, Grid Configuration (GC) Protocol, Two-Replica Distribution Techniques (TRDT), Neighbour Replica Triangular Grid (NRTG) and Neighbour Replication Distributed Techniques (NRDT). These techniques have its own redeeming features and shortcoming which forms the subject matter of this survey.
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS cscpconf
Initially wireless networks were fully infrastructure based and hence imposed the necessity to
install base station. Base station leads to single point of failure and causes scalability problems.
With the advent of mobile adhoc networks, these problems are mitigated, by allowing certain
mobile nodes to form a dynamic and temporary communication network without any preexisting
infrastructure. Caching is an important technique to enhance the performance in any network. Particularly, in MANETs, it is important to cache frequently accessed data not only to reduce average latency and wireless bandwidth but also to avoid heavy traffic near the data centre. With data being cached by mobile nodes, a request to the data centre can easily be serviced by a nearby mobile node instead of the data centre alone. In this paper we propose a system , Time Index Based Approach that focuses on providing recent data on demand basis. In this system, the data comes along with a time stamp. In our work we propose three policies namely Item Discovery, Item Admission and Item Replacement, to provide data availability even with limited resources. Data consistency is ensured here since if the mobile client receives the same data item with an updated time, the previous content along with time is replaced to provide only recent data. Data availability is promised by mobile nodes, instead of the data server. We enhance the space availability in a node by deploying automated replacement policy.
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Networkijassn
In a wireless sensor network Quality of Information (QoI), Energy Efficiency, Redundant data avoidance,
congestion control are the important metrics that affect the performance of wireless sensor network. As
many approaches were proposed to increase the performance of a wireless sensor network among them
clustering is one of the efficient approaches in sensor network. Many clustering algorithms concentrate
mainly on power Optimization like FSCH, LEACH, and EELBCRP. There is necessity of the above
metrics in wireless sensor network where nodes are densely deployed in a given network area. As the nodes
are deployed densely there is maximum possibility of nodes appear in the sensing region of other nodes. So
there exists an option that nodes have to send the information that is already reached the base station by its
own cluster members or by members of other clusters. This mechanism will affect the QoI, Energy factor
and congestion control of the wireless sensor networks. Even though clustering uses TDMA (Time Division
Multiple Access) for avoiding congestion control for intra clustering data transmission, but it may fail in
some critical situation. This paper proposed a energy efficient clustering which avoid data redundancy in a
dense sensor network until the network becomes sparse and hence uses the TDMA efficiently during high
density of the nodes.
Efficiency enhancement using optimized static scheduling technique in TSCH ne...IJECEIAES
In recent times, the reliable and real-time data transmission becomes a mandatory requirement for various industries and organizations due to the large utilization of Internet of Things (IoT) devices. However, the IoT devices need high reliability, precise data exchange and low power utilization which cannot be achieved by the conventional Medium Access Control (MAC) protocols due to link failures and high interferences in the network. Therefore, the Time-Slotted Channel Hopping (TSCH) networks can be used for link scheduling under the IEEE 802.15.4e standard. In this paper, we propose an Optimized Static Scheduling Technique (OSST) for the link scheduling in IEEE 802.15.4e based TSCH networks. In OSST the link schedule is optimized by considering the packet latency information during transmission by checking the status of the transmitted packets as well as keeping track of the lost data packets from source to destination nodes. We evaluate the proposed OSST model using 6TiSCH Simulator and compare the different performance metrics with Simple distributed TSCH Scheduling.
Enhancement of Routing Performance for Energy Efficiency and Critical Event M...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document discusses methods for estimating the parameters of a multivariate normal distribution when certain constraints are placed on the parameters. Specifically, it considers:
1) Estimating the mean sub-vector when the constraint Rμ1 = r is placed, where R and r are known. It derives the maximum likelihood estimator for this case when the covariance matrix is known and unknown.
2) Estimating a submatrix of the covariance matrix Σ when the constraint Σ11 = kΣ110 is placed, where Σ110 is a known submatrix and k is an unknown parameter. It derives the maximum likelihood estimator for k.
3) Provides the likelihood function when a general constraint of Σ = k
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
This document evaluates the modal damping of graphite/epoxy laminated composites through experimental testing. Graphite/epoxy laminate composite plates of different thicknesses (2mm and 4mm) and fiber orientations (0 and 45 degrees) were fabricated and tested under different boundary conditions (cantilever, two sides fixed, all sides fixed) using an impulse excitation technique. The results show that modal damping decreases with increasing laminate thickness and is sensitive to changes in boundary conditions. Damping was highest for the cantilever boundary condition and lowest for the two sides fixed condition. Evaluation of modal damping through experimental modal analysis provides a simple and effective technique for characterizing damping properties of composite laminates.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering and Science (The IJES)theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Higher Throughput Maintenance Using Average Time Standard for Multipath Data ...Eswar Publications
Wireless network has come out as one of the key enablers for reliable data delivery for different types of applications.Ad-hoc
network consists of self-actuated node that collaborates in order to transfer the information.Trajectory-based Statistical
Forwarding (TSF) method used optimal target point selection algorithm to forward packets in order to satisfy probability of
packet delivery over multi-hopbut failed provide higher throughput on the multipath data delivery. TheVoid Aware Pressure Routing (VAPR) method used hop count and intensity information to build a directional data delivery system but
performance of specialized geographic routing based multipath data delivery was not attained. To maintain the higher
throughput level on ad-hoc network data delivery, Median Multicast Throughput Data Delivery (MMTDD) mechanism is
proposed in thispaper.The basic idea of MMTDD mechanism is to divide a message into multiple shares and deliver them via
multiple independent source paths to the destination. MMTDD mechanism with the average time standard takes the best
threshold value for every data (i.e.,) packet partitioning by avoiding packet loss. By this means, MMTDD mechanism uses
the Average Time Standard (ATS) to guarantee the required packet allocationwith higher throughput level. With the application of ATS, the MMTDD mechanism derives the theoretical model by attainingapproximately 4% higher throughput level on the multipath data delivery in ad-hoc network. MMTDD mechanism makes use of time scheduling
schemes to discover and maintain data delivery paths with minimal time consumption.Median Multicast in MMTDD
mechanism used the balanced state flow model to deliver data on multiple paths and experiment is conducted on factors such
as time consumption, data delivery rate,average delivery delay and throughput level.
A CROSS LAYER PROTOCOL BASED ON MAC AND ROUTING PROTOCOLS FOR HEALTHCARE APPL...ijassn
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In much of this research tasks like sensor data processing, health states decision making and emergency message sending are done by a remote server. Many patients with lots of sensor data consume a great deal of communication resources, bring a burden to the remote server and delay the decision time and notification time. A healthcare application for elderly people using WSN has been simulated in this paper. A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been
designed and implemented, with new features, such as a mobility module and routes discovery algorithms have been added. Simulation results show that the proposed cross layer based protocol can conserve energy for nodes and provide the required performance such as life time of the network, delay and reliability for the proposed healthcare application.
IRJET- An Efficient Data Replication in Salesforce Cloud EnvironmentIRJET Journal
This paper proposes an efficient data replication strategy to improve reliability of data stored in the Salesforce cloud environment. The strategy replicates data from Salesforce to the Amazon Web Services cloud for redundancy. It uses a lightweight time-series algorithm to predict which data files will be most frequently requested in the future and prioritizes those for replication. The number of replicas is determined dynamically based on availability thresholds. This strategy aims to improve fault tolerance, ensure data availability even if the primary Salesforce storage fails, and meet quality of service requirements in a cost effective manner for businesses using cloud computing.
The document discusses four key challenges for implementing embedded cloud computing:
1. Configuring systems for data timeliness and reliability across multiple data streams and applications.
2. Configuring ad-hoc datacenters for remote operations in a timely manner based on available cloud resources.
3. Ensuring configuration accuracy so data timeliness and reliability are optimized for the given computing resources.
4. Reducing development complexity to allow systems to readily configure and operate across different cloud environments and applications.
A cross layer protocol based on mac and routing protocols for healthcare appl...ijassn
Using Wireless Sensor Networks (WSNs) in healthcare systems has had a lot of attention in recent years. In
much of this research tasks like sensor data processing, health states decision making and emergency
message sending are done by a remote server. Many patients with lots of sensor data consume a great deal
of communication resources, bring a burden to the remote server and delay the decision time and
notification time. A healthcare application for elderly people using WSN has been simulated in this paper.
A WSN designed for the proposed healthcare application needs efficient MAC and routing protocols to
provide a guarantee for the reliability of the data delivered from the patients to the medical centre. Based
on these requirements, A cross layer based on the modified versions of APTEEN and GinMAC has been
designed and implemented, with new features, such as a mobility module and routes discovery algorithms
have been added. Simulation results show that the proposed cross layer based protocol can conserve
energy for nodes and provide the required performance such as life time of the network, delay and
reliability for the proposed healthcare application.
Marshalling is the process of formatting data structures for transmission between programs. Distributed systems face challenges related to scalability, availability, consistency, and security from both a system and network perspective. Peer-to-peer networks allow direct communication between nodes without a central server through decentralization, self-organization, scalability, and fault tolerance. Distributed systems improve efficiency by sharing hardware resources like processors and storage, as well as software resources like applications and services. Architectural models like client-server and functional models help define and design distributed systems. When designing client-server systems for telecommunications, considerations include network connectivity, scalability, security, resource management, data management, load balancing, quality of service, reliability, and interoper
This document summarizes a proposed enhancement to the OpenStack Nova scheduler to incorporate network factors into virtual machine scheduling decisions. The current Nova scheduler only considers CPU, memory, and storage utilization when placing VMs, but not network utilization or connectivity. The proposed enhancement adds a network filter and weighting to Nova's filtering scheduler. It would check network interface status and bandwidth when initially placing VMs to ensure connectivity. It would also enable dynamic VM migration if a host's network card fails. This aims to optimize VM placement and improve performance by considering network factors.
Regardless of whether you use a direct attached storage array, or a network-attached storage (NAS) appliances, or a storage area network (SAN) to host your data, if this data infrastructure is not designed for high availability, then the data it stores is not highly available by extension, application availability is at risk – regardless of server clustering.
The purpose of this paper is to outline best practices for improving overall business application availability by building a highly available data infrastructure.
Download this paper to:
- Learn how to develop a High Availability strategy for your applications
- Identify the differences between Hardware and Software-defined infrastructures in terms of Availability
- Learn how to build a Highly Available data infrastructure using Hyper-converged storage
Study Of Coded Based Mechanism In WSN SystemIJERA Editor
This document summarizes a study on providing quality of service (QoS) in wireless sensor networks through the use of error correcting codes and selective encryption. It first provides background on wireless sensor networks and challenges in providing QoS. It then discusses forward error correction techniques like Reed-Solomon coding that can improve reliability while reducing energy consumption compared to retransmissions. It also discusses selective encryption algorithms that can encrypt parts of data to provide security with lower computation costs than fully encrypting all data. The document reviews open research issues in QoS for wireless sensor networks and improving the tradeoff between reliability, security and energy efficiency.
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesEditor IJMTER
Cloud environment supports data sharing between multiple users. Data integrity is violated
due to hardware / software failures and human errors. Data owners and public verifiers are involved to
efficiently audit cloud data integrity without retrieving the entire data from the cloud server. File and
block signatures are used in the integrity verification process.
“One Ring to RUle Them All” (Oruta) scheme is used for privacy-preserving public auditing process. In
oruta homomorphic authenticators are constructed using Ring Signatures. Ring signatures are used to
compute verification metadata needed to audit the correctness of shared data. The identity of the signer
on each block in shared data is kept private from public verifiers. Homomorphic authenticable ring
signature (HARS) scheme is applied to provide identity privacy with blockless verification. Batch
auditing mechanism supports to perform multiple auditing tasks simultaneously. Oruta is compatible
with random masking to preserve data privacy from public verifiers. Dynamic data management process
is handled with index hash tables. Traceability is not supported in oruta scheme. Data dynamism
sequence is not managed by the system. The system obtains high computational overhead
The proposed system is designed to perform public data verification with privacy. Traceability features
are provided with identity privacy. Group manager or data owner can be allowed to reveal the identity of
the signer based on verification metadata. Data version management mechanism is integrated with the
system.
Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad H...Eswar Publications
Routing in mobile ad-hoc networks is an integral aspect of communication between devices. Routing is considered to
be a challenging task in MANETs due to the drastic and unpredictable changes in network topologies as a result of
the random and frequent movement of the nodes and due to the absence of any centralized control. Several routing protocols have been designed and developed to perform under various network environments. In this work a systematic simulation based performance study of the four prominent routing protocols: Ad hoc on Demand Multipath Routing Distance Vector (AOMDV), Dynamic Source Routing (DSR), Ad Hoc On Demand Distance Vector (AODV) and Temporarily Ordered Routing (TORA) protocols in the simulated networking environment under varying number of nodes in various scenarios is performed. These protocols use on-demand routing and have different protocol mechanisms leading to differences in performance. The performance is analyzed and evaluated based on end to end delay, packet delivery ratio, routing overheads and through-put done by varying network load, and the size of the network. Based on the observations, we make recommendations about the performance of the
protocols.
1) The document discusses different mechanisms for data dissemination to mobile devices, including push-based (data is broadcast without requests), pull-based (data is sent on demand in response to requests), and hybrid approaches.
2) A key challenge is asymmetric communication bandwidth, with much higher bandwidth available for sending data to devices than for receiving data from them.
3) Push-based broadcasting allows data to be sent efficiently to multiple devices simultaneously but may disseminate unwanted information, while pull-based on-demand delivery only sends requested data but can overburden servers with many requests.
IRJET- Improving Data Availability by using VPC Strategy in Cloud Environ...IRJET Journal
This document discusses improving data availability in cloud environments using virtual private cloud (VPC) strategies and data replication strategies (DRS). It proposes using VPC to define private networks in public clouds and deploying cloud resources into those private networks for improved security and control. It also proposes using DRS to store multiple copies of data across different nodes to increase data availability, reduce bandwidth usage, and provide fault tolerance. The proposed approach identifies popular data files for replication, selects the best storage sites based on factors like request frequency, failure probability, and storage usage, and decides when to replace replicas to optimize resource usage. A simulation showed this hybrid VPC and DRS approach improved performance metrics like response time, network usage, and load balancing compared to
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Effective Replicated Server Allocation Algorithms in Mobile computing Systemsijwmn
In mobile environments, mobile device users access and transfer a great deal of data through the online servers. In order to enhance users’ access speed in a wireless network, decentralizing replicated servers appropriately in the network is required. Previous work regarding this issue had focused on the placement of replicated servers along with the moving paths of the users to maximize the hit ratio. When a miss occurs, they simply ignored the file request. Therefore, we suggest a solution to take care of such a miss by sending a file request to a replicated server nearby in the network
Ensuring the Adaptive Path for the Routing in 5g Wireless NetworkIJSRED
The document discusses routing in 5G wireless networks and proposes using cache memory rather than RAM to store routing information. This would make routing more adaptive by allowing nodes to quickly access cached routing data when paths are re-used, avoiding the need to re-broadcast routing information. It describes challenges of wireless network routing like mobility and limited resources. Existing distance-vector and link-state routing protocols are not well suited for wireless networks. The proposed system would use dynamic source routing to more efficiently establish and maintain routes while reducing overhead from periodic routing updates.
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
An Efficient Queuing Model for Resource Sharing in Cloud Computingtheijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Design and optimization of ion propulsion dronebjmsejournal
Electric propulsion technology is widely used in many kinds of vehicles in recent years, and aircrafts are no exception. Technically, UAVs are electrically propelled but tend to produce a significant amount of noise and vibrations. Ion propulsion technology for drones is a potential solution to this problem. Ion propulsion technology is proven to be feasible in the earth’s atmosphere. The study presented in this article shows the design of EHD thrusters and power supply for ion propulsion drones along with performance optimization of high-voltage power supply for endurance in earth’s atmosphere.
artificial intelligence and data science contents.pptxGauravCar
What is artificial intelligence? Artificial intelligence is the ability of a computer or computer-controlled robot to perform tasks that are commonly associated with the intellectual processes characteristic of humans, such as the ability to reason.
› ...
Artificial intelligence (AI) | Definitio
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Rainfall intensity duration frequency curve statistical analysis and modeling...bijceesjournal
Using data from 41 years in Patna’ India’ the study’s goal is to analyze the trends of how often it rains on a weekly, seasonal, and annual basis (1981−2020). First, utilizing the intensity-duration-frequency (IDF) curve and the relationship by statistically analyzing rainfall’ the historical rainfall data set for Patna’ India’ during a 41 year period (1981−2020), was evaluated for its quality. Changes in the hydrologic cycle as a result of increased greenhouse gas emissions are expected to induce variations in the intensity, length, and frequency of precipitation events. One strategy to lessen vulnerability is to quantify probable changes and adapt to them. Techniques such as log-normal, normal, and Gumbel are used (EV-I). Distributions were created with durations of 1, 2, 3, 6, and 24 h and return times of 2, 5, 10, 25, and 100 years. There were also mathematical correlations discovered between rainfall and recurrence interval.
Findings: Based on findings, the Gumbel approach produced the highest intensity values, whereas the other approaches produced values that were close to each other. The data indicates that 461.9 mm of rain fell during the monsoon season’s 301st week. However, it was found that the 29th week had the greatest average rainfall, 92.6 mm. With 952.6 mm on average, the monsoon season saw the highest rainfall. Calculations revealed that the yearly rainfall averaged 1171.1 mm. Using Weibull’s method, the study was subsequently expanded to examine rainfall distribution at different recurrence intervals of 2, 5, 10, and 25 years. Rainfall and recurrence interval mathematical correlations were also developed. Further regression analysis revealed that short wave irrigation, wind direction, wind speed, pressure, relative humidity, and temperature all had a substantial influence on rainfall.
Originality and value: The results of the rainfall IDF curves can provide useful information to policymakers in making appropriate decisions in managing and minimizing floods in the study area.
Rainfall intensity duration frequency curve statistical analysis and modeling...
H03401049054
1. The International Journal Of Engineering And Science (IJES)
|| Volume || 3 || Issue || 4 || Pages || 49 - 54 || 2014 ||
ISSN (e): 2319 – 1813 ISSN (p): 2319 – 1805
www.theijes.com The IJES Page 49
Survey on Phoenix: Storage Using an Autonomous Mobile
Infrastructure
1,
Mr. Mahesha H.S, 2,
Mr. Prasanna Kumar M
1,
M.tech Student in East West Institute of Technology, Dept of CSE
Bangalore, Karnataka, India.
Assistant professor
2,
East West Institute of Technology, Dept of CSE Bangalore, Karnataka, India.
-----------------------------------------------------------ABSTRACT-----------------------------------------------------------
Distributed computing is a science which solves a large problem by giving small parts of the problem to many
computers to solve and then combining the solutions for the parts into a solution for the problem. As the
increasing amount of data is collected in mobile wireless networks for emerging pervasive applications, data-
centric storage provides energy-efficient data dissemination and organization. One of the approaches in data
centric storage is that the nodes that collected data will transfer their data to other neighbouring nodes that
store the similar type of data. However, when the nodes are mobile, type-based data distribution alone cannot
provide robust data storage and retrieval, since the nodes that store similar types may move far away and
cannot be easily reachable in the future. Reliable storage of data with concurrent read/write accesses still
appears to be a challenging problem in mobile ad hoc networks.
KEYWORDS: Distributed Coding, Distributed storage, Distributed systems, Mobile ad hoc network (MANET),
Mobile storage systems, Replication, Reliable Data Storage.
-------------------------------------------------------------------------------------------------------------------------------- -----
Date of Submission: 15 March 2014 Date of Publication: 05 April 2014
--------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
A Mobile Ad hoc network (MANET) is a collection of wireless nodes communicating with each other
in the absence of any infrastructure. Existing cloud service providers use centralized data centres to provide
computation and storage services to the users. The distributed data storage on unreliable devices, connected by a
short-range radio network is analyzed. Failing devices incur loss of data. To prevent the loss, the data is split and
distributed across the network. Combining networking and storage has created a platform with numerous
possibilities allowing Distributed Storage Systems (DSS) to adopt roles vast and varied which fall well beyond
data storage. Networking infrastructure and distributed computing share a close relationship. Distributed systems
designed to operate on the Internet need to cope with a potential user base numbering in the millions. To
accommodate a large user base, distributed systems are employing more scalable decentralised Peer-to-Peer
architectures over conventional centralised architectures. Distributed systems which operate across a public
network need to accommodate for a variety of potentially malicious behaviour from free-riding to Denial of
Service (DoS) attacks.A distributed computer system consists of multiple software components that are on
multiple computers, but run as a single system. The computers that are in a distributed system can be physically
close together and connected by a local network, or they can be geographically distant and connected by a wide
area network. A distributed system can consist of any number of possible configurations, such as mainframes,
personal computers, workstations, minicomputers, and so on. The goal of distributed computing is to make such
a network work as a single computer.
Distributed systems offer many benefits over centralized systems, including the following:
Scalability: The system can easily be expanded by adding more machines as needed.
Redundancy: Several machines can provide the same services, so if one is unavailable, work does not stop.
Additionally, because many smaller machines can be used, this redundancy does not need to be prohibitively
expensive.
Distributed computing systems can run on hardware that is provided by many vendors, and can use a
variety of standards-based software components. Such systems are independent of the underlying software. They
can run on various operating systems, and can use various communications protocols. Ensuring data persistence
is a major challenge in designing a mobile storage system because of various reasons.
2. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 50
Due to their arbitrary movement patterns, mobile devices can leave or join networks non-
deterministically, making data persistence challenging. Mobile devices can shut down or fail unexpectedly. Also,
mobile devices may delete some cached data contents due to lack of sufficient storage space. Wireless
communications among mobile devices are error-prone. Furthermore a lot of applications in this situations are
time dependant and, therefore, their connections be supposed to be perform not simply appropriately, however as
well contained by their time limits. In a Distributed Database System, Data is repeatedly replicated to get better
consistency and accessibility. Though one significant subject to be measured as replicating Data is the accuracy
of the Replicated Data. As Nodes in MANETS are Mobile and contain some degree of Power, disentanglement
might happen often, cause a group of Network separation. Mobile hosts cannot access data, which is obtainable
in Mobile hosts in one division in another detachment. The subject connected to Data Replication in MANETS
Databases is as. Server Power Consumption: Servers in MANETS run on battery Power. If Servers have a small
Power remains and if it replicated with numerous often-contact Data objects, then the numerous Data access
requests for these hot Data will consume its Power.
Server Mobility: Because of its Mobility, Servers may from time to time shift to a position where they might
not be getting in touch with by any other Servers or Clients.
Client Mobility: Client which inquiry Servers for Information is as well Mobile. Clients more often than not
launch their contacts to the adjacent Servers to obtain a rapid reaction. The choice to Replicate Data substance at
exacting Servers might be found on the way in frequencies of Data matter from those precise Servers. Therefore,
the judgment to Replicate Data stuff at suitable Servers has to be dynamic and found on the current Network
topology
Client Power: Clients in MANETS also run on battery Power. If Clients stay excessively extended for its
communications fallout, it may drop its Power quickly. The Replication technique ought to be capable to
Replicate Data matter at suitable Servers in such a way that a Client may be capable to contact its demanded
Data substances from its adjacent Server, which has the smallest amount workload.
Time Critical Applications: Numerous MANET applications, like rescue Networks, military processes, are
time dependant. Data Replication is supposed to be used to progress Data ease of access and performance of the
System, thus falling the time to perform communications. Dealings with short time limit ought to be sent to the
nearest Server, which contain the smallest amount workload for their implementation.
II. LITERATURE SURVEY
a) Wangand Li [14] proposed In order to minimize the communication overhead and achieve efficient data
retrieval in data-centric mobile environments, we propose a fully distributed neighbourhood prediction scheme
that utilizes past node trajectory information to determine the near likely node in the future as the best content
distribute As in any traditional distributed setting, a set of runtime algorithms to ensure the availability of
centralized services to all mobile nodes in networks that are frequently partitioned and is a non-power-aware,
non-real-time-aware, and partition-aware system. An ideal MANET data replication strategy should be power-
aware, real-time-aware, and partition-aware. Phoenix, as an underlying storage layer can help reduce the
complexity of MANET databases by handling the node mobility and communication failures in a power-efficient
manner, while guaranteeing the level of redundancy.
b) The ―classic‖ academic approach to providing highly available data objects, the state-machine approach ,
consists in synchronizing a set of server replicas, each hosting a copy of the data, to handle all updates and
queries in the same way (―write all – read one‖). This approach provides perfect guarantees in theory, yet is
expensive to implement even in wired networks. In particular, the atomic broadcast protocol ensures that each
server replica obtains all updates and in the same order, but it comes with a prohibitively large overhead. Clearly,
with an underlying highly dynamic adhoc network, the synchronism required for state machine replication
becomes un-practicable. Even with weaker consistency guarantees (e.g., without ordering guarantees), state
machine replication leads to poor performance in adhoc networks. Further sacrificing safety guarantees such as
atomicity through the use of a probabilistic dissemination of updates (e.g., probabilistic broadcast ) is indeed an
option, yet the incurred overhead is not low enough to address a broad application context. A more drastic shift
seems to be necessary.
c) Distributed storage systems such as OceanStore use Distributed Hash Tables (DHT) to manage the mapping
from a collection of keys to values autonomously without any central control. DHT-based systems [5], [6], [7],
3. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 51
[8],attempt to reduce the latency among nodes on wide-area networks by constantly updating their routing tables
to improve the lookup speed. Phoenix, on the other hand, focuses on maintaining the desired number of copies of
the data items in autonomous mobile nodes within a geographic region.
d) By introducing probabilities for the intersection of individual quorums, the construction rules for these
quorums are relaxed, and more freedom is left for trading protocol overhead for reliability. As this smoother
tradeoff has constituted the driving force behind probabilistic quorum systems, it also turns out that the resulting
reduced determinism makes such an approach more viable than a strict approach for ad hoc networks. Problem
for providing reliable storage in MANETs using probabilistic quorum system [9].
e) The Random Waypoint Mobility Model is used in many prominent simulation studies of ad hoc network
protocols. For example a conference setting or museum. The Gauss-Markov Mobility Model also provides
movement patterns that one might expect in the real-world, if appropriate parameters are chosen. In addition, this
method also forces MNs to keep away from the edges of the simulation area While the Probabilistic Random
Walk Mobility Model also provides movement patterns that one might expect in the real-world, choosing
appropriate parameters for the probability matrix may be difficult. The Manhatten Model appears to create
realistic movements for a section of a city since it severely restricts the travelling behaviour of MNs, MNs do not
have the ability to roam freely without regard to obstacles and other traffic regulations. The Reference Point
Group Mobility Model (RPGM) is a generic method for handling group mobility. These are the models proposed
for mobile Adhoc networks to aid in designing efficient communication protocols for networks [10],[11].
f) Phoenix, on the other hand, is more deterministic in nature. Its primary goal is to maintain the desired level of
data storage redundancy fairly accurately. While Phoenix does not support data updates directly, MANET
databases that require data replication [12] can be built on top of Phoenix and rely on its protocol to handle
issues related to node mobility and unreliable communication channels.
g) Using error correction coding in distributed systems for fault tolerance has not been widely applied in multi-
agent systems. Current multi-agent platforms like JADE and COUGAAR use replication. Replication needs a lot
of storage and bandwidth support, and information theoretic results tell us that we can do better. Some
information theoretic ideas are used by the CFS cooperative storage and the OceanStore. In [13], Miletic and
Dewilde consider reliability of a distributed storage system using an information-theoretic approach.
h) The push-pull method for data dissemination through the three way handshake of advertisement-request-code
has been used previously in sensor networks with sensed data taking the place of code. Protocols such as SPIN
[3] and SPMS [4] rely on the advertisement and the request packets being much smaller than the data packets
and the redundancy in the network deployments which make several nodes disinterested in any given
advertisement. However, in the data dissemination protocols, there is only suppression of the requests and the
data sizes are much smaller than the entire binary code images.
i) Reliable multicast in unreliable environments, such as ad-hoc networks, can be achieved by epidemic multicast
protocols based on each node gossiping the message it received to a subset of neighbours [2]. These protocols
give probabilistic guarantee for the update to reach all the group members. The probability is monotonically
increasing with the fan-out of each node (the number of neighbours to gossip to) and the quiescence threshold
(the time after which a node will stop gossiping to its neighbours). By increasing the quiescence threshold, the
reliability can be made to approach 2, which is the basic premise behind all the epidemic based code update
protocols in sensor networks – Deluge, MNP, and Freshet.
j) Various models[15] for mobility are 1. Random Waypoint Mobility Model: A model that includes pause times
between changes in destination and speed.
2. Reference Point Group Model: A model that forces MNs to travel to according to the speed and direction of
group leader
3. City Section Based Models: Freeway Mobility model where A node here moves in lanes as in case of city and
its velocity depends on previous one and in case of Manhattan Mobility model where Nodes are free to move in
any direction
4 Gauss-Markov Mobility Model: A model that uses one tuning parameter to vary the degree of randomness in
the mobility pattern.
5. A Probabilistic Version of the Random Walk Mobility Model: A model that utilizes a set of probabilities to
determine the next position of an MN.
4. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 52
III. EXISTING SYSTEM
Fig 1: Flow chart showing the overview of phoenix. The shaded and unshaded blocks are the winner and the
follower respectively.
When a node joins the network, it may or may not have information blocks. Each node starts an
advertisement timer asynchronously—independent of the advertisement timers of other nodes. If the node does
not receive any advertisement message before its advertisement timer expires, it assumes that it has won the
round and broadcasts an advertisement for one of the blocks (say b1) that it currently possesses. If the node hears
an advertisement message before its advertisement timer fires, it assumes that it has lost the current round and
becomes a follower node. The follower node checks if it has b1—the block advertised by the winner node. If so,
it starts a reply timer and when that timer expires, it broadcasts an advertisement for b1, if it has heard less than
K advertisements for b1 in the current round. If it has heard K or more advertisements for b1, it deletes b1
because it knows that there are K or more nodes storing the copies of b1. On the other hand, if the follower node
does not have b1, it starts a request timer and when that timer expires, it checks if it has heard K or more
advertisements for b1. If so, it knows that there are K copies of b1 and, thus, does nothing and starts a new
round. If it does not hear K or more advertisements for b1, it suspects that there may be less than K copies of b1
in the network. At this point, the node does not conclude that there are less than K copies because it may have
missed some advertisements due to wireless communication failures. To ensure that there are indeed less than K
copies of b1, it goes to the verification step, where it communicates with its neighbors to determine if they have
b1. After the verification step, if the node finds that there are K or more copies of b1, it does nothing and starts a
new round. Otherwise, it goes to the data download state, where it downloads b1 from one of its neighbors.
Then, the node starts a new round.
IV. PROPOSED SYSTEM
Node1 With
All 10 Blocks
Node 2 With
3 Blocks
Node 3 with First
4 Blocks
Node 4 with
block no 5,6
Internet
or
Network
Node 8 with
block no 7,8,9,10
Node 7 with
block no 7,8,9,10
Node 6 with
block no 5,6
Node 5 with
First 4 Blocks
KDC
(Key Distribution
Center)
Fig2: content distribution among several nodes
5. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 53
The above diagram shows the practical implementation of our proposed approach with contents
distributed among several nodes. In this approach we design a content distribution approach, for which we
propose an algorithm called phoenix which is described below We are enhancing the application by proving the
security to the algorithm by introducing key distribution center. KDC provides the service of generating and
distribution public/ private keys to the set of group of nodes in the network. Each node when joining the group
contacts the key distribution center and get the private key for the group using RSA Algorithm (Chinese
Reminder Theorem).Then the node performs the following initiation.
Functional Requirements
The functional requirements for a system describe what the system should do. These requirements
depend on the type of software being developed, the expected users of the software and the general approach
taken by the organization when writing requirements. When expressed as user requirements, the requirements
are usually described in a fairly abstract way. However, functional system requirements describe the system
function in detail, its inputs and outputs, exceptions, and so on.
Functional requirements are as follows:
The proposed system should ensure the longevity of the stored data, even in the presence of
autonomous node mobility.
The protocol proposed should scale well with the number of mobile devices and cached information
content.
The protocol should be asynchronous
Non-Functional Requirement
Non-functional requirements, as the name suggests, are requirements that are not directly concerned
with the specific functions delivered by the system. They may relate to emergent system properties such as
reliability, response time and store occupancy. Alternatively, they may define constraints on the system such as
the capabilities of I/O devices and the data representations used in system interfaces.
All nodes should be within the communication range of each other.
Does not require central control or global knowledge about the current network conditions.
V. CONCLUSION
To improve network connectivity, researchers have proposed many mobility prediction schemes to
predict the future availability of wireless links, for the purpose of building more stable end-to-end connections.
In contrast, there are fewer studies of the effect of dynamic network topology on application-level issues, such as
the provisioning of centralized service in wireless ad-hoc networks. Although distributed applications are better
suited for the adhoc network due to its peer-to-peer architecture, important network applications and services
such as web servers, location information databases and network services. The main appeal of the wireless
cellular and ad-hoc networks is that they allow both user mobility and unthread connectivity. However, user
mobility poses significant challenges to network operations such as routing, resource management, and Quality
of Service (QoS) provisioning. Node mobility leads to frequent disconnections of wireless links, hence the
network topology changes dynamically. We propose a fully distributed grouping algorithm for a node to identify
its stable group the group of nodes it has reliable connectivity with at run-time, using only local observations.
REFERENCES
[1] Jun Luo, JeanPierre Hubaux, Patrick Th. Eugster, School of Computer and Communication Sciences Swiss Federal Institute of
Technology (EPFL), Lausanne, Switzerland "PAN: Providing Reliable Storage in Mobile Ad Hoc Networks with Probabilistic
Quorum Systems" June 1–3, 2003, 5005-67322
[2] J. Luo, P. T. Eugster, and J. P. Hubaux, "Route driven gossip: probabilistic reliable multicast in ad hoc networks," at the Twenty-
Second Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 2229-2239, 2003.
[3] J. Kulik, W. Heinzelman, and H. Balakrishnan, "Negotiation-based protocols for disseminating information in wireless sensor
networks," Wireless Networks, vol. 8, no. 2/3, pp. 169-185, 2002.
[4] G. Khanna, S. Bagchi, and Y-S. Wu, "Fault tolerant energy aware data dissemination protocol in sensor networks," at the
International Conference on Dependable Systems and Networks, pp. 795-804, 2004.
[5] S. Rhea, B. Godfrey, B. Karp, J. Kubiatowicz, S. Ratnasamy, S. Shenker, I. Stoica, and H. Yu, ―OpenDHT: A Public DHT
Service and Its Uses,‖ ACM SIGCOMM Computer Comm. Rev., vol. 35, pp. 73-84, 2005.
[6] A. Rowstron and P. Druschel, ―Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer
Systems,‖ Proc. IFIP/ACM Int’l Conf. Distributed Systems Platforms Heidelberg (Middleware ’01), pp. 329-350, 2001.
[7] I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan, ―Chord: A Scalable Peer-to-Peer Lookup Service for Internet
Applications,‖ ACM SIGCOMM Computer Comm. Rev., vol. 31, no.4, pp. 149-160, 2001
[8] B. Zhao, J. Kubiatowicz, and A. Joseph, ―Tapestry: A Fault-Tolerant Wide-Area Application Infrastructure,‖ ACM SIGCOMM
Computer Comm. Rev., vol. 32, p. 81, 2002.
[9] D. Malkhi, M.K. Reiter, A. Wool, and R.N. Wright, ―Probabilistic Quorum Systems,‖ Information and Computation, vol. 170, no.
2,pp. 184-206, 2001.
6. Survey on Survey on Phoenix: Storage Using an Autonomous Mobile Infrastructure
www.theijes.com The IJES Page 54
[10] T. Camp, J. Boleng, and V. Davies, ―A Survey of Mobility Models for Adhoc Networks,‖ Wireless Comm. and Mobile
Computing, vol. 2, pp. 483-502, 2002.
[11] X. Hong, M. Gerla, G. Pei, and C. Chiang, ―A Group Mobility Model for Ad Hoc Wireless Networks,‖ Proc. ACM Second Int’l
Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999.
[12] P. Padmanabhan, L. Gruenwald, A. Vallur, and M. Atiquzzaman, ―A Survey of Data Replication Techniques for Mobile Ad Hoc
Network Databases,‖ The VLDB J., vol. 17, no. 5, pp. 1143-1164, 2008.
[13] F. Miletic and P. Dewilde, ―Data Storage in Unreliable Multi-Agent Networks,‖ Proc. Conf. Autonomous agents and Multiagent
Systems, 2005.
[14] K. Wang and B. Li, ―Efficient and Guaranteed Service Coverage in Partitionable Mobile Ad-Hoc Networks,‖ Proc. IEEE
INFOCOM,2002.
[15] Tracy Camp ,Jeff Boleng, Vanessa Davies, ―A Survey of Mobility Models for Ad Hoc Network Research‖, Wireless
Communication & Mobile Computing (WCMC) Special issue on Mobile Ad Hoc Networking: Research, Trends and
Applications, vol. 2, no. 5, pp. 483-502, 2002.