SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                            (IJERA) ISSN: 2248-9622 www.ijera.com
                             Vol. 2, Issue 4, July-August 2012, pp.120-125
            Data Caching Placement based on information density in
                           wireless ad hoc network

                                         C.Srinivas, Samreen Khan

Abstract
                                                              network is generally resource constrained in terms of
     Data caching strategy for ad hoc networks whose
                                                              channel bandwidth or battery power in the nodes.
nodes exchange information items in a peer-to-peer
                                                              Caching helps in reducing communication, this results in
fashion. Data caching is a fully distributed scheme where
                                                              savings in bandwidth, as well as battery energy. The
each node, upon receiving requested information,
                                                              problem of cache placement is particularly challenging
determines the cache drop time of the information or
                                                              when each network node has a limited memory to cache
which content to replace to make room for the newly
                                                              data items.
arrived information. These decisions are made
depending on the perceived ―presence‖ of the content in
                                                                        In this paper, our focus is on developing
the nodes proximity, whose estimation does not cause
                                                              efficient caching techniques in ad hoc networks with
any additional overhead to the information sharing
                                                              memory limitations. Research into data storage, access,
system.
                                                              and dissemination techniques in ad hoc networks is not
                                                              new. In particular, these mechanisms have been
We devise a strategy where nodes, independent of each
                                                              investigated in connection with sensor networking peer-
other, decide whether to cache some content and for how
                                                              to-peer networks mesh networks world wide Web and
long. In the case of small-sized caches, we aim to design
                                                              even more general ad hoc networks. However, the
a content replacement strategy that allows nodes to
                                                              presented approaches have so far been somewhat ―ad
successfully store newly received information while
                                                              hoc‖ and empirically based, without any strong
maintaining the good performance of the content
                                                              analytical foundation. In contrast, the theory literature
distribution system. Under both conditions, each node
                                                              abounds in analytical studies into the optimality
takes decisions according to its perception of what
                                                              properties of caching and replica allocation problems.
nearby users may store in their caches and with the aim
                                                              However, distributed implementations of these
of differentiating its own cache content from the other
                                                              techniques and their performances in complex network
nodes’.
                                                              settings have not been investigated. It is even unclear
                                                              whether these techniques are amenable to efficient
     The result is the creation of content diversity within
                                                              distributed implementations.
the nodes neighbourhood so that a requesting user likely
finds the desired information nearby. We simulate our
                                                                        Our goal in this paper is to develop an approach
caching algorithms in different ad hoc network scenarios
                                                              that is both analytically tractable with a provable
and compare them with other caching schemes, showing
                                                              performance bound in a centralized setting and is also
that our solution succeeds in creating the desired content
                                                              amenable to a natural distributed implementation. In our
diversity, thus leading to a resource-efficient information
                                                              network model, there are multiple data items; each data
access.
                                                              item has a server, and a set of clients that wish to access
                                                              the data item at a given frequency. Each node carefully
Key terms: Data Caching,           Distributed    Caching
                                                              chooses data items to cache in its limited memory to
Algorithm, Ad hoc network
                                                              minimize the overall access cost. Essentially, in this
                                                              article, we develop efficient strategies to select data
I. INTRODUCTION                                               items to cache at each node. In particular, we develop
         Ad hoc networks are multi hop wireless               two algorithms—a centralized approximation algorithm,
networks of small computing devices with wireless             which delivers a 4-approximation (2-approximation for
interfaces. The computing devices could be conventional       uniform size data items) solution, and a localized
computers (for example, PDA, laptop, or PC) or                distributed algorithm, which is based on the
backbone routing platforms or even embedded                   approximation algorithm and can handle mobility of
processors such as sensor nodes. The problem of optimal       nodes and dynamic traffic conditions. Using simulations,
placement of caches to reduce overall cost of accessing       we show that the distributed algorithm performs very
data is motivated by the following two defining               close to the approximation algorithm. Finally, we show
characteristics of ad hoc networks. First, the ad hoc         through extensive experiments on ns2 that our proposed
networks are multi hop networks without a central base        distributed algorithm performs much better than a prior
station. Thus, remote access of information typically         approach over a broad range of parameter values. Ours is
occurs via multi hop routing, which can greatly benefit       the first work to present a distributed implementation
from caching to reduce access latency. Second, the            based on an approximation algorithm for the general

                                                                                                        120 | P a g e
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                            (IJERA) ISSN: 2248-9622 www.ijera.com
                             Vol. 2, Issue 4, July-August 2012, pp.120-125
problem of cache placement of multiple data items under      how long, resulting in a distributed scheme that does not
memory constraint.                                           require additional control messages.

         Data caching strategy for ad hoc networks           The Hamlet approach applies to the following cases.
whose nodes exchange information items in a peer-to-         • Information presence estimation. In this case we
peer fashion. Data caching is a fully distributed scheme     define the reach range of a generic node that can receive
where each node, upon receiving requested information,       a query generated by node n itself. As an example, in an
determines the cache drop time of the information or         ideal setting in which all nodes have the same radio
which content to replace to make room for the newly          range, the reach range is given by the product of TTL
arrived information. These decisions are made                and the node radio range. Next we denote by f the
depending on the perceived ―presence‖ of the content in      frequency at which every node estimate the presence of
the nodes proximity, whose estimation does not cause         each information item with in the reach range , and we
any additional overhead to the information sharing           define as 1/f the duration of each estimation step (also
system.                                                      called time step hereafter).
                                                                   The generic node n uses the information captured
          We devise a strategy where nodes, independent      with in its reach range, during the estimation step j, to
of each other, decide whether to cache some content and      compute the following quantities:1) a provider counter
for how long. In the case of small-sized caches, we aim      by using application-layer data and 2) a transit counter
to design a content replacement strategy that allows         by using data that are collected through channel
nodes to successfully store newly received information       overhearing in a cross-layer fashion. These counters are
while maintaining the good performance of the content        defined as follows:
distribution system. Under both conditions, each node        • Provider counter dic(n, j). This quantity accounts for
takes decisions according to its perception of what          the presence of new copies of information i’s chunks c,
nearby users may store in their caches and with the aim      delivered by n to querying nodes within its range during
of differentiating its own cache content from the other      step j. Node n updates this quantity every time it acts as
nodes’. The result is the creation of content diversity      a provider node.( e.g., like node P in the upper plot of
within the nodes neighbourhood so that a requesting user     figure 2)
likely finds the desired information nearby. We simulate
our caching algorithms in different ad hoc network
scenarios and compare them with other caching schemes,
showing that our solution succeeds in creating the
desired content diversity, thus leading to a resource-
efficient information access.

II. SYSTEM OUTLINE OVERVIEW:
           Hamlet is fully distributed caching wireless ad
hoc networks whose nodes exchange information item in
a peer to peer fashion. In particular we address a mobile
ad hoc network whose nodes might be resource-
constrained devices, pedestrian users, or vehicles on city
roads. Each node runs an application to request and
possibly cache desired information items. Nodes in the       • Large-sized caches. In this case, nodes can potentially
network retrieve information items from other users that     store a large portion (i.e., up to 50%) of the available
temporarily cache (part of ) the requested items or from     information items. Reduced memory usage is a desirable
one or more gate way nodes, which can store content or       (if not required) condition, because the same memory
quickly fetch it from the internet .                         may be shared by different services and applications that
   We propose, called Hamlet, aims at creating content       run at nodes. In such a scenario, a caching decision
diversity within the node neighbourhood so that users        consists of computing for how long a given content
likely find a copy of the different information items        should be stored by a node that has previously requested
nearby (Regardless of the content popularity level) and      it, with the goal of minimizing the memory usage
avoid flooding the network with query messages.              without affecting the overall information retrieval
Although a similar concept has been put forward in the       performance;
novelty in our proposal resides in the probabilistic
estimate, run by each node, of the information presence      • Small-sized caches. In this case, nodes have a dedicated
(i.e., of the cached content) in the node proximity. The     but limited amount of memory where to store a small
estimate is performed in a cross-layer fashion by            percentage (i.e., up to 10%) of the data that they retrieve.
overhearing content query and information reply              The caching decision translates into a cache replacement
messages due to the broadcast nature of the wireless         strategy that selects the information items to be dropped
channel. By leveraging such a local estimate, nodes          among the information items just received and the
autonomously decide what information to keep and for         information items that already fill up the dedicated

                                                                                                        121 | P a g e
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                            (IJERA) ISSN: 2248-9622 www.ijera.com
                             Vol. 2, Issue 4, July-August 2012, pp.120-125
memory. We evaluate the performance of Hamlet in            clarity of presentation, we assume uniform-size
different mobile network scenarios, where nodes             (occupying unit memory) data items for now. Our
communicate through ad hoc connectivity. The results        techniques easily generalize to non-uniform size data
show that our solution ensures a high query resolution      items, as discussed later. Each node i has a memory
ratio while maintaining the traffic load very low, even     capacity of mi units. We use aij to denote the access
for scarcely popular content, and consistently along        frequency with which a node i requests the data item Dj ,
different network connectivity and mobility scenarios.      and dil to denote the weighted distance between two
                                                            network nodes i and l. The cache placement problem is
III. System Analysis                                        to select a set of sets M = {M1, M2. . . ,Mp}, where Mj is a
                                                            set of networknodes that store a copy of Dj , to minimize
      In this we are going to deal with the caching         the total access cost
placement problems and algorithm. Those are as follows:

    1.   SELF-ORGANIZING
                                                            under the memory capacity constraint that
    2.   SELF-ADDRESSING (MANET)

    3.   INTEGRATED CACHE-ROUTING                           which means each network node i appears in at most mi
                                                            sets of M. The cache placement problem is known to be
    4.   LOCALIZED CACHING POLICY                           NP-hard [3].
                                                            EXAMPLE 1: Figure 1 illustrates the above described
    5.   DISTRIBUTED CACHING ALGORITHM                      cache placement problem in a small ad hoc network. In
                                                            Figure 2, each graph edge has a unit weight. All the
      1. SELF-ORGANIZING                                    nodes have the same memory capacity of 2 pages, and
          Multiple Data’s deals with the three algorithms   the size of each data item is 1 memory page. Each of the
for cache placement of multiple data items in ad hoc        nodes 1, 2, 3, 4, and 12 have one distinct data item to be
networks. In the first approach, each node caches the       served (as shown in the parenthesis with their node
items most frequently accessed by itself; the second        numbers). Each of the client nodes (9, 10, 11, 13, and 14)
approach eliminates replications among neighboring          accesses each of the data items D1;D2, and D3 with unit
nodes introduced by the first approach; the third           access frequency. Figure 2 shows that the nodes 5, 6, 7,
approach require one or more ―central‖ nodes to gather      8 have cached one or more data items, and also shows
neighbourhood information and determine caching             the cache contents in those nodes. As indicated by the
placements. The first two approaches are largely            bold edges, the clients use the nearest cache node instead
localized, and hence, would fare very badly when the        of the server to access a data item. The set of cache
percentage of client nodes in the network is low, or the    nodes of each data item are: M1 = {7, 8},M2 = {7, 8}, M3
access frequencies are uniform. In the third approach, it   = {5, 6}. One can observe that total access cost is 20
is hard to find stable groups in ad hoc networks because    units for the given cache placement.
of frequent failures and movements.

2. SELF-ADDRESSING (MANET):
          A multi-hop ad hoc network can be represented
as an undirected graph G(V, E) where the set of nodes
vertices V the nodes in the network and E are the set of
weighted edges in the graph. Two network nodes that
can communicate directly with each other are connected
by an edge in the graph. The edge weight may represent
a link metric such as loss rate, delay, or transmission
power. For the cache placement problem addressed in
this article, there are multiple data items and each data
item is served by its server (a network node may act as a
server for more than one data items). Each network node
has limited memory and can cache multiple data items
subject to its memory capacity limitation. The objective
                                                            Fig. 2. Illustrating cache placement problem under
of our cache placement problem is to minimize the
                                                            memoryconstraint
overall access cost. Below, we give a formal definition
of the cache placement problem addressed in this system.
          Problem Formulation. Given a general ad hoc
network graph G(V;E) with p data items D1,D2………,Dp,
where a data item Dj is served by a server Sj . A network
node may act as a server for multiple data items. For

                                                                                                       122 | P a g e
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                              (IJERA) ISSN: 2248-9622 www.ijera.com
                               Vol. 2, Issue 4, July-August 2012, pp.120-125
3. Integrated Cache Routing                                            In addition, the inaccuracies and staleness of the
                                                               nearest cache table entries (due to message losses or
        Integrated cache routing is based on three step        arbitrary communication delays) may result in
procedure those are as follows:                                approximate local benefit values. Finally, in DGA, the
     Nearest-caching tables can be used in                    placement of caches happens simultaneously at all nodes
        conjunction with any underlying routing                in a distributed manner, which is in contrast to the
        protocol to reach the nearest cache node, as           sequential manner in which the caches are selected by
        long as the distances to other nodes are               the CGA. However, DGA is able to cope with
        maintained by the routing protocol.                    dynamically changing access frequencies and cache
                                                               placements. As noted before, any changes in cache
         However, note that maintaining cache-routing         placements trigger updates in the nearest-cache table,
          tables instead of nearest-cache tables and           which in turn affect the local benefit values. Below is a
          routing tables doesn’t offer any clear advantage     summarized description of the DGA.
          in terms of number of messages transmissions.        Algorithm 1: Distributed Greedy Algorithm (DGA)
                                                               Setting
         We could maintain the integrated cache-routing                   A network graph G(V;E) with p data items.
tables in the similar vein as routing tables are maintained    Each node i has a memory capacity of mi pages. Let 
in mobile ad hoc networks. Alternatively, we could have        be the benefit threshold.
the servers periodically broadcast the latest cache lists.     Program of Node i
In our simulations, we adopted the latter strategy, since it   BEGIN
precludes the need to broadcast Add Cache and Delete                       When a data item Dj passes by
Cache messages to some extent.                                             if local memory has available space and (Bij >
                                                                 )
4. LOCALIZED CACHING POLICY                                                then cache Dj
     The caching policy of DGA is as follows. Each                        else if there is a set D of cached data items such
      node computes benefit of data items based on             that(local benefit of D < Bij   and (|D|  |Dj |),
                                                                                                       )
      its ―local traffic‖ observed for a sufficiently          then replace D with Dj
      long time. The local traffic of a node i includes                    When a data item Dj is added to local cache
      its own local data requests, non-local data                          Notify the server of Dj
      requests to data items cached at i, and the traffic                  Broadcast an AddCache message with (i ,Dj)
      that the node i is forwarding to other nodes in                      When a data item Dj is deleted from local cache
      the network.                                                         Get the cache list Cj from the server of Dj
                                                                           Broadcast a DeleteCache message with
         A node decides to cache the most beneficial (in      (i’,Dj ,Cj)
          terms of local benefit per unit size of data item)   On receiving an AddCache message
          data items that can fit in its local memory.              (i’,Dj)
          When the local cache memory of a node is full,       if i’ is nearer than current nearest-
          the following cache replacement policy is used.             cache for Dj
                                                               then update nearest-cache table entry
         In particular, a data item is newly cached only if            and broadcast the AddCache
          its local benefit is higher than the benefit                  message to neighbors
          threshold, and a data item replaces a set of         else send the message to the nearest-
          cached data items only if the difference in their            cache of i
          local benefits is greater than the benefit           On receiving a DeleteCache message
          threshold.                                                 (i0, Dj, Cj )
                                                               if i’ is the current nearest-cache for Dj
    6.    DISTRIBUTED GREEEDY ALGORITHM                        then update the nearest-case of Dj
          (DGA)                                                       using Cj , and broadcast the
                 Distributed Greedy Algorithm (DGA) is                 DeleteCache message
also known as Distributed Caching Algorithm (DCA).             else send the message to the nearest-
               The above components of nearest-cache                   cache of i
table and cache replacement policy are combined to             For mobile networks, instead of
yield our Distributed Greedy Algorithm (DGA) for                        AddCache and DeleteCache
cache placement problem. In addition, the server uses the              messages, for each data item, its
cache list to periodically update the                                  server periodically broadcasts (to
caches in response to changes to the data at the server.               the entire network) the latest
The departure of DGA from CGA is primarily in its                      cache list.
inability to gather information about all traffic (access      END.
frequencies).

                                                                                                           123 | P a g e
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                            (IJERA) ISSN: 2248-9622 www.ijera.com
                             Vol. 2, Issue 4, July-August 2012, pp.120-125
Performance Analysis. Based on the above observation,                We have developed efficient data caching
if we assume that local benefit is reflective of the                  algorithms to determine near optimal cache
accurate benefit (i.e., if the local traffic seen by a node i         placements to maximize reduction in overall
is the only traffic that is affected by caching a data item           access cost. Reduction in access cost leads to
at node i), then DGA also yields a solution whose benefit             communication cost savings and hence, better
is one fourth of the optimal benefit.                                 bandwidth usage and energy savings.
Data Expiry and Cache Updates. We incorporate the
concepts of data expiry and cache updates in our overall             However, our simulations over a wide range of
framework as follows. For data expiry, we use the                     network and application parameters show that
concept of Time-to-Live (TTL) [7], which is the time till             the performance of the caching algorithms.
which the given copy of the data item is considered
valid/fresh. The data item or its copy is considered                 Presents a distributed implementation based on
expired at the                                                        an approximation algorithm for the problem of
end of the TTL time value. We consider two data expiry                cache placement of multiple data items under
models, viz. TTL-per-request and TTL-per-item. In                     memory constraint.
   the TTL-per-request data expiry model [7], the server
   responds to any data item request with the requested              The result is the creation of content diversity
   data item and an appropriately generated TTL value.                within the nodes neighborhood so that a
   Thus, each copy of the data item in the network is                 requesting user likely finds the desired
   associated with an independent TTL value. In the TTL-              information nearby.
   per-item data expiry model, the server associates a
   TTL value with each data item (rather than each                   We simulate our caching algorithms in different
   request), and all requests for the same data item are              ad hoc network scenarios and compare them
   associated with the same TTL (until the data item                  with other caching schemes, showing that our
   expires). Thus, in the TTL-per-item data expiry model,             solution succeeds in creating the desired content
   all the fresh copies of a data item in the network are             diversity, thus leading to a resource-efficient
   associated with the same TTL value. On expiry of the               information access.
   data item, the server generates a new TTL value for
   the data item. For updating the cached data items, we        LIMITATIONS & FUTURE
   consider two mechanisms. For the case of TTL-per-            ENHANCEMENTS :
   request data expiry model, we use the cache deletion         Hamlet is caching self contained and is designed to self
   update model, where each cache node independently            adapt to network environments with different mobility
   deletes its copy of the expired data item. Such              and connectivity features.
   deletions are handled in the similar way as describe         We assume a content distribution system where the
   before, i.e., by broadcasting a DeleteCache request. In      following assumptions hold:
   the case of TTL-per-item data expiry model, all the
   copies of a particular data item expire simultaneously.      1) A number I of information items is available to the
   Thus, we use the server multicast cache update model,        users, with each item divided into a number C of chunks;
   wherein the server multicasts the fresh copy of the
   data item to all the cache nodes, on expiration of the       2) User nodes can overhear queries for content and
   data item (at the server). If the cache list is not          relative responses within their radio proximity by
   maintained at the server, then the above update is           exploiting the broadcast nature of the wireless medium;
   implemented using a network wide broadcast                   and

CONCLUSION:                                                     3) User nodes can estimate their distance in hops from
     Data caching strategy for ad hoc networks                 the query source and the responding node due to a hop-
      whose nodes exchange information items in a               count field in the messages. Although Hamlet can work
      peer-to-peer fashion. Data caching is a fully             with any system that satisfies the aforementioned three
      distributed scheme where each node, upon                  generic assumptions, for concreteness, we detail the
      receiving requested information, determines the           features of the specific content retrieval system that we
      cache drop time of the information or which               will consider in the remainder of this paper.
      content to replace for the newly arrived
      information.
                                                                REFERENCE & BIBLIOGRAPHY:
     We have developed a paradigm of data caching                      Good Teachers are worth more than thousand
      techniques to support effective data access in ad         books, we have them in Our Department.
      hoc networks. In particular, we have considered           [1]   Caching Strategies Based on Information Density
      memory capacity constraint of the network                       Estimation in Wireless Ad Hoc NetworksMarco
      nodes.                                                          Fiore, Member, IEEE, Claudio Casetti, Member,
                                                                      IEEE, and Carla-Fabiana Chiasserini, Senior
                                                                                                         124 | P a g e
C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, July-August 2012, pp.120-125
       Member, IEEE IEEE TRANSACTIONS ON                         dissemination,‖ IEEE Trans. Knowl. Data Eng.,
       VEHICULAR TECHNOLOGY, VOL. 60, NO. 5,                     vol. 16, no. 1, pp. 125–139, Jan. 2004.
       JUNE 2011 pg.no.1294 to pg.no.2028
                                                          [14]   J. Cao, Y. Zhang, G. Cao, and L. Xie, ―Data
[2]    B.-J. Ko and D. Rubenstein, ―Distributed self-            consistency for cooperative caching in mobile
       stabilizing placement of replicated resources in          environments,‖ Computer, vol. 40, no. 4, pp. 60–
       emerging networks,‖ IEEE/ACM Trans. Netw.,                66, Apr. 2007.
       vol. 13, no. 3, pp. 476–487, Jun. 2005.
                                                          [15]   N. Dimokas, D. Katsaros, and Y. Manolopoulos,
[3]    ―Benefit-based Data Caching in Ad Hoc                     ―Cache consistency in wireless multimedia sensor
       Networks ‖ Bin Tang, Member, IEEE, Himanshu               networks,‖ Ad Hoc Netw., vol. 8, no. 2, pp. 214–
       Gupta, Member, IEEE, and Samir R. Das,                    240, Mar. 2010.
       Member, IEEE
                                                          [16]   M. Fiore, F. Mininni, C. Casetti, and C.-F.
[4]    G. Cao, L. Yin, and C. R. Das, ―Cooperative               Chiasserini, ―To cache or not to cache?‖ in Proc.
       cache-based data access in ad hoc networks,‖              IEEE INFOCOM, Rio de Janeiro, Brazil, Apr.
       Computer, vol. 37, no. 2, pp. 32–39, Feb. 2004.           2009, pp. 235–243.

[5]    C.-Y. Chow, H. V. Leong, and A. T. S. Chan,        REFERENCES MADE FROM:
       ―GroCoca: Group-based peer-to-peer cooperative
       caching in mobile environment,‖ IEEE J. Sel.       1. Professional Java Network Programming
       Areas Commun., vol. 25, no. 1, pp. 179–191, Jan.   2. Java Complete Reference
       2007.                                              4. Data Communications and Networking, by Behrouz A
                                                          Forouzan.
[6]    T. Hara, ―Cooperative caching by mobile clients    5. Computer Networking: A Top-Down Approach, by
       in push-based information systems,‖ in Proc.       James F. Kurose.
       CIKM, 2002, pp. 186–193.                           6. Operating System Concepts, by Abraham Silberschatz.

[7]    L. Yin and G. Cao, ―Supporting cooperative                 C.Srinivas M.Tech Associate Professor , HOD
       caching in ad hoc networks,‖ IEEE Trans. Mobile    IT Department, Sree Visvesvraya Institute of technology
       Comput., vol. 5, no. 1, pp. 77–89, Jan. 2006.      and Sciences affiliated to JNTUH, approved by AICTE
                                                          New Delhi, Mahabubnagar. His research includes
[8]    N. Dimokas, D. Katsaros, and Y. Manolopoulos,      Information security , Networking
       ―Cooperative caching in wireless multimedia
       sensor networks,‖ ACM Mobile Netw. Appl., vol.
       13, no. 3/4, pp. 337–356, Aug. 2008.
                                                                          Samreen Khan pursuing M.Tech CSE
[9]    Y. Du, S. K. S. Gupta, and G. Varsamopoulos,                       final year in Sree Visvesvaraya
       ―Improving on-demand data access efficiency in                     Institute of Technology and Science
       MANETs with cooperative caching,‖ Ad Hoc                           affiliated to JNTUH, approved by
       Netw., vol. 7, no. 3, pp. 579–598, May 2009.                       AICTE New Delhi. Chowderpally
                                                                          Mahabubnagar.
[10]   W. Li, E. Chan, and D. Chen, ―Energy-efficient                               Research area includes Java
       cache replacement policies for cooperative         computer network, information security .
       caching in mobile ad hoc network,‖ in Proc. IEEE
       WCNC, Kowloon, Hong Kong, Mar. 2007, pp.
       3347–3352.

[11]   M. K. Denko and J. Tian, ―Cross-layer design for
       cooperative caching in mobile ad hoc networks,‖
       in Proc. IEEE CCNC, Las Vegas, NV, Jan. 2008,
       pp. 375–380.
[12]   H. Chen, Y. Xiao, and X. Shen, ―Update-based
       cache replacement policies in wireless data
       access,‖ in Proc. BroadNets, Boston, MA, Oct.
       2005, pp. 797–804.

[14]   J. Xu, Q. Hu, W.-C. Lee, and D. L. Lee,
       ―Performance evaluation of an optimal cache
       replacement   policy    for  wireless  data

                                                                                                  125 | P a g e

Weitere ähnliche Inhalte

Was ist angesagt?

Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access inShakas Technologies
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNRIRJET Journal
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizedlogicsystemsprojects
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
LSTM deep learning method for network intrusion detection system
LSTM deep learning method for network intrusion  detection system LSTM deep learning method for network intrusion  detection system
LSTM deep learning method for network intrusion detection system IJECEIAES
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
Classical Distributed Algorithms with DDS
Classical Distributed Algorithms with DDSClassical Distributed Algorithms with DDS
Classical Distributed Algorithms with DDSAngelo Corsaro
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjripublishers Ijri
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaAngelo Corsaro
 
Introducing Vortex Lite
Introducing Vortex LiteIntroducing Vortex Lite
Introducing Vortex LiteAngelo Corsaro
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part IIAngelo Corsaro
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
 
2001 Poovendran Baras
2001 Poovendran Baras2001 Poovendran Baras
2001 Poovendran Barasguest731e90
 

Was ist angesagt? (19)

Cooperative caching for efficient data access in
Cooperative caching for efficient data access inCooperative caching for efficient data access in
Cooperative caching for efficient data access in
 
IRJET- Securely Performing Operations on Images using PSNR
IRJET-  	  Securely Performing Operations on Images using PSNRIRJET-  	  Securely Performing Operations on Images using PSNR
IRJET- Securely Performing Operations on Images using PSNR
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
a hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorizeda hybrid cloud approach for secure authorized
a hybrid cloud approach for secure authorized
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
LSTM deep learning method for network intrusion detection system
LSTM deep learning method for network intrusion  detection system LSTM deep learning method for network intrusion  detection system
LSTM deep learning method for network intrusion detection system
 
Project titles abstract_2012
Project titles abstract_2012Project titles abstract_2012
Project titles abstract_2012
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
Classical Distributed Algorithms with DDS
Classical Distributed Algorithms with DDSClassical Distributed Algorithms with DDS
Classical Distributed Algorithms with DDS
 
Ijricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedingsIjricit 01-006 a secluded approval on clould storage proceedings
Ijricit 01-006 a secluded approval on clould storage proceedings
 
Getting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and ScalaGetting Started with DDS in C++, Java and Scala
Getting Started with DDS in C++, Java and Scala
 
Introducing Vortex Lite
Introducing Vortex LiteIntroducing Vortex Lite
Introducing Vortex Lite
 
41 125-1-pb
41 125-1-pb41 125-1-pb
41 125-1-pb
 
The DDS Tutorial Part II
The DDS Tutorial Part IIThe DDS Tutorial Part II
The DDS Tutorial Part II
 
DDS Made Simple
DDS Made SimpleDDS Made Simple
DDS Made Simple
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
2001 Poovendran Baras
2001 Poovendran Baras2001 Poovendran Baras
2001 Poovendran Baras
 

Andere mochten auch (20)

O24114119
O24114119O24114119
O24114119
 
On2423772387
On2423772387On2423772387
On2423772387
 
Ap25250255
Ap25250255Ap25250255
Ap25250255
 
Ni2421862197
Ni2421862197Ni2421862197
Ni2421862197
 
Bh25352355
Bh25352355Bh25352355
Bh25352355
 
N24108113
N24108113N24108113
N24108113
 
Z24172184
Z24172184Z24172184
Z24172184
 
Nn2422192223
Nn2422192223Nn2422192223
Nn2422192223
 
S24137143
S24137143S24137143
S24137143
 
Nr2422372240
Nr2422372240Nr2422372240
Nr2422372240
 
Mu2421122117
Mu2421122117Mu2421122117
Mu2421122117
 
Ny2422782281
Ny2422782281Ny2422782281
Ny2422782281
 
Og2423252330
Og2423252330Og2423252330
Og2423252330
 
Mw2421212125
Mw2421212125Mw2421212125
Mw2421212125
 
Discurso Armando Monteiro no Ministério do Desenvolvimento
Discurso Armando Monteiro no Ministério do DesenvolvimentoDiscurso Armando Monteiro no Ministério do Desenvolvimento
Discurso Armando Monteiro no Ministério do Desenvolvimento
 
Sexualidad Y Adolescencia
Sexualidad Y AdolescenciaSexualidad Y Adolescencia
Sexualidad Y Adolescencia
 
Formacion De Conceptos Matematicos
Formacion De Conceptos MatematicosFormacion De Conceptos Matematicos
Formacion De Conceptos Matematicos
 
Mate
MateMate
Mate
 
Arthur & caique
Arthur & caiqueArthur & caique
Arthur & caique
 
las drogas
las drogaslas drogas
las drogas
 

Ähnlich wie P24120125

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Mumbai Academisc
 
A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...csandit
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...cscpconf
 
A request skew aware heterogeneous distributed
A request skew aware heterogeneous distributedA request skew aware heterogeneous distributed
A request skew aware heterogeneous distributedJoão Gabriel Lima
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksijwmn
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksPapitha Velumani
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012Vipin Jacob
 
Iaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional HistoricalArul Suju
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Shakas Technologies
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...IJECEIAES
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01graphhoc
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...IJCI JOURNAL
 

Ähnlich wie P24120125 (20)

International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
 
A request skew aware heterogeneous distributed
A request skew aware heterogeneous distributedA request skew aware heterogeneous distributed
A request skew aware heterogeneous distributed
 
Peer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networksPeer to peer cache resolution mechanism for mobile ad hoc networks
Peer to peer cache resolution mechanism for mobile ad hoc networks
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
Java and .net IEEE 2012
Java and .net IEEE 2012Java and .net IEEE 2012
Java and .net IEEE 2012
 
Iaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cacheIaetsd decentralized coordinated cooperative cache
Iaetsd decentralized coordinated cooperative cache
 
B0330811
B0330811B0330811
B0330811
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
P2P Cache Resolution System for MANET
P2P Cache Resolution System for MANETP2P Cache Resolution System for MANET
P2P Cache Resolution System for MANET
 
328 334
328 334328 334
328 334
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
A Cooperative Cache Management Scheme for IEEE802.15.4 based Wireless Sensor ...
 
5113jgraph01
5113jgraph015113jgraph01
5113jgraph01
 
Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...Analyse the performance of mobile peer to Peer network using ant colony optim...
Analyse the performance of mobile peer to Peer network using ant colony optim...
 

Kürzlich hochgeladen

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

P24120125

  • 1. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 Data Caching Placement based on information density in wireless ad hoc network C.Srinivas, Samreen Khan Abstract network is generally resource constrained in terms of Data caching strategy for ad hoc networks whose channel bandwidth or battery power in the nodes. nodes exchange information items in a peer-to-peer Caching helps in reducing communication, this results in fashion. Data caching is a fully distributed scheme where savings in bandwidth, as well as battery energy. The each node, upon receiving requested information, problem of cache placement is particularly challenging determines the cache drop time of the information or when each network node has a limited memory to cache which content to replace to make room for the newly data items. arrived information. These decisions are made depending on the perceived ―presence‖ of the content in In this paper, our focus is on developing the nodes proximity, whose estimation does not cause efficient caching techniques in ad hoc networks with any additional overhead to the information sharing memory limitations. Research into data storage, access, system. and dissemination techniques in ad hoc networks is not new. In particular, these mechanisms have been We devise a strategy where nodes, independent of each investigated in connection with sensor networking peer- other, decide whether to cache some content and for how to-peer networks mesh networks world wide Web and long. In the case of small-sized caches, we aim to design even more general ad hoc networks. However, the a content replacement strategy that allows nodes to presented approaches have so far been somewhat ―ad successfully store newly received information while hoc‖ and empirically based, without any strong maintaining the good performance of the content analytical foundation. In contrast, the theory literature distribution system. Under both conditions, each node abounds in analytical studies into the optimality takes decisions according to its perception of what properties of caching and replica allocation problems. nearby users may store in their caches and with the aim However, distributed implementations of these of differentiating its own cache content from the other techniques and their performances in complex network nodes’. settings have not been investigated. It is even unclear whether these techniques are amenable to efficient The result is the creation of content diversity within distributed implementations. the nodes neighbourhood so that a requesting user likely finds the desired information nearby. We simulate our Our goal in this paper is to develop an approach caching algorithms in different ad hoc network scenarios that is both analytically tractable with a provable and compare them with other caching schemes, showing performance bound in a centralized setting and is also that our solution succeeds in creating the desired content amenable to a natural distributed implementation. In our diversity, thus leading to a resource-efficient information network model, there are multiple data items; each data access. item has a server, and a set of clients that wish to access the data item at a given frequency. Each node carefully Key terms: Data Caching, Distributed Caching chooses data items to cache in its limited memory to Algorithm, Ad hoc network minimize the overall access cost. Essentially, in this article, we develop efficient strategies to select data I. INTRODUCTION items to cache at each node. In particular, we develop Ad hoc networks are multi hop wireless two algorithms—a centralized approximation algorithm, networks of small computing devices with wireless which delivers a 4-approximation (2-approximation for interfaces. The computing devices could be conventional uniform size data items) solution, and a localized computers (for example, PDA, laptop, or PC) or distributed algorithm, which is based on the backbone routing platforms or even embedded approximation algorithm and can handle mobility of processors such as sensor nodes. The problem of optimal nodes and dynamic traffic conditions. Using simulations, placement of caches to reduce overall cost of accessing we show that the distributed algorithm performs very data is motivated by the following two defining close to the approximation algorithm. Finally, we show characteristics of ad hoc networks. First, the ad hoc through extensive experiments on ns2 that our proposed networks are multi hop networks without a central base distributed algorithm performs much better than a prior station. Thus, remote access of information typically approach over a broad range of parameter values. Ours is occurs via multi hop routing, which can greatly benefit the first work to present a distributed implementation from caching to reduce access latency. Second, the based on an approximation algorithm for the general 120 | P a g e
  • 2. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 problem of cache placement of multiple data items under how long, resulting in a distributed scheme that does not memory constraint. require additional control messages. Data caching strategy for ad hoc networks The Hamlet approach applies to the following cases. whose nodes exchange information items in a peer-to- • Information presence estimation. In this case we peer fashion. Data caching is a fully distributed scheme define the reach range of a generic node that can receive where each node, upon receiving requested information, a query generated by node n itself. As an example, in an determines the cache drop time of the information or ideal setting in which all nodes have the same radio which content to replace to make room for the newly range, the reach range is given by the product of TTL arrived information. These decisions are made and the node radio range. Next we denote by f the depending on the perceived ―presence‖ of the content in frequency at which every node estimate the presence of the nodes proximity, whose estimation does not cause each information item with in the reach range , and we any additional overhead to the information sharing define as 1/f the duration of each estimation step (also system. called time step hereafter). The generic node n uses the information captured We devise a strategy where nodes, independent with in its reach range, during the estimation step j, to of each other, decide whether to cache some content and compute the following quantities:1) a provider counter for how long. In the case of small-sized caches, we aim by using application-layer data and 2) a transit counter to design a content replacement strategy that allows by using data that are collected through channel nodes to successfully store newly received information overhearing in a cross-layer fashion. These counters are while maintaining the good performance of the content defined as follows: distribution system. Under both conditions, each node • Provider counter dic(n, j). This quantity accounts for takes decisions according to its perception of what the presence of new copies of information i’s chunks c, nearby users may store in their caches and with the aim delivered by n to querying nodes within its range during of differentiating its own cache content from the other step j. Node n updates this quantity every time it acts as nodes’. The result is the creation of content diversity a provider node.( e.g., like node P in the upper plot of within the nodes neighbourhood so that a requesting user figure 2) likely finds the desired information nearby. We simulate our caching algorithms in different ad hoc network scenarios and compare them with other caching schemes, showing that our solution succeeds in creating the desired content diversity, thus leading to a resource- efficient information access. II. SYSTEM OUTLINE OVERVIEW: Hamlet is fully distributed caching wireless ad hoc networks whose nodes exchange information item in a peer to peer fashion. In particular we address a mobile ad hoc network whose nodes might be resource- constrained devices, pedestrian users, or vehicles on city roads. Each node runs an application to request and possibly cache desired information items. Nodes in the • Large-sized caches. In this case, nodes can potentially network retrieve information items from other users that store a large portion (i.e., up to 50%) of the available temporarily cache (part of ) the requested items or from information items. Reduced memory usage is a desirable one or more gate way nodes, which can store content or (if not required) condition, because the same memory quickly fetch it from the internet . may be shared by different services and applications that We propose, called Hamlet, aims at creating content run at nodes. In such a scenario, a caching decision diversity within the node neighbourhood so that users consists of computing for how long a given content likely find a copy of the different information items should be stored by a node that has previously requested nearby (Regardless of the content popularity level) and it, with the goal of minimizing the memory usage avoid flooding the network with query messages. without affecting the overall information retrieval Although a similar concept has been put forward in the performance; novelty in our proposal resides in the probabilistic estimate, run by each node, of the information presence • Small-sized caches. In this case, nodes have a dedicated (i.e., of the cached content) in the node proximity. The but limited amount of memory where to store a small estimate is performed in a cross-layer fashion by percentage (i.e., up to 10%) of the data that they retrieve. overhearing content query and information reply The caching decision translates into a cache replacement messages due to the broadcast nature of the wireless strategy that selects the information items to be dropped channel. By leveraging such a local estimate, nodes among the information items just received and the autonomously decide what information to keep and for information items that already fill up the dedicated 121 | P a g e
  • 3. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 memory. We evaluate the performance of Hamlet in clarity of presentation, we assume uniform-size different mobile network scenarios, where nodes (occupying unit memory) data items for now. Our communicate through ad hoc connectivity. The results techniques easily generalize to non-uniform size data show that our solution ensures a high query resolution items, as discussed later. Each node i has a memory ratio while maintaining the traffic load very low, even capacity of mi units. We use aij to denote the access for scarcely popular content, and consistently along frequency with which a node i requests the data item Dj , different network connectivity and mobility scenarios. and dil to denote the weighted distance between two network nodes i and l. The cache placement problem is III. System Analysis to select a set of sets M = {M1, M2. . . ,Mp}, where Mj is a set of networknodes that store a copy of Dj , to minimize In this we are going to deal with the caching the total access cost placement problems and algorithm. Those are as follows: 1. SELF-ORGANIZING under the memory capacity constraint that 2. SELF-ADDRESSING (MANET) 3. INTEGRATED CACHE-ROUTING which means each network node i appears in at most mi sets of M. The cache placement problem is known to be 4. LOCALIZED CACHING POLICY NP-hard [3]. EXAMPLE 1: Figure 1 illustrates the above described 5. DISTRIBUTED CACHING ALGORITHM cache placement problem in a small ad hoc network. In Figure 2, each graph edge has a unit weight. All the 1. SELF-ORGANIZING nodes have the same memory capacity of 2 pages, and Multiple Data’s deals with the three algorithms the size of each data item is 1 memory page. Each of the for cache placement of multiple data items in ad hoc nodes 1, 2, 3, 4, and 12 have one distinct data item to be networks. In the first approach, each node caches the served (as shown in the parenthesis with their node items most frequently accessed by itself; the second numbers). Each of the client nodes (9, 10, 11, 13, and 14) approach eliminates replications among neighboring accesses each of the data items D1;D2, and D3 with unit nodes introduced by the first approach; the third access frequency. Figure 2 shows that the nodes 5, 6, 7, approach require one or more ―central‖ nodes to gather 8 have cached one or more data items, and also shows neighbourhood information and determine caching the cache contents in those nodes. As indicated by the placements. The first two approaches are largely bold edges, the clients use the nearest cache node instead localized, and hence, would fare very badly when the of the server to access a data item. The set of cache percentage of client nodes in the network is low, or the nodes of each data item are: M1 = {7, 8},M2 = {7, 8}, M3 access frequencies are uniform. In the third approach, it = {5, 6}. One can observe that total access cost is 20 is hard to find stable groups in ad hoc networks because units for the given cache placement. of frequent failures and movements. 2. SELF-ADDRESSING (MANET): A multi-hop ad hoc network can be represented as an undirected graph G(V, E) where the set of nodes vertices V the nodes in the network and E are the set of weighted edges in the graph. Two network nodes that can communicate directly with each other are connected by an edge in the graph. The edge weight may represent a link metric such as loss rate, delay, or transmission power. For the cache placement problem addressed in this article, there are multiple data items and each data item is served by its server (a network node may act as a server for more than one data items). Each network node has limited memory and can cache multiple data items subject to its memory capacity limitation. The objective Fig. 2. Illustrating cache placement problem under of our cache placement problem is to minimize the memoryconstraint overall access cost. Below, we give a formal definition of the cache placement problem addressed in this system. Problem Formulation. Given a general ad hoc network graph G(V;E) with p data items D1,D2………,Dp, where a data item Dj is served by a server Sj . A network node may act as a server for multiple data items. For 122 | P a g e
  • 4. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 3. Integrated Cache Routing In addition, the inaccuracies and staleness of the nearest cache table entries (due to message losses or Integrated cache routing is based on three step arbitrary communication delays) may result in procedure those are as follows: approximate local benefit values. Finally, in DGA, the  Nearest-caching tables can be used in placement of caches happens simultaneously at all nodes conjunction with any underlying routing in a distributed manner, which is in contrast to the protocol to reach the nearest cache node, as sequential manner in which the caches are selected by long as the distances to other nodes are the CGA. However, DGA is able to cope with maintained by the routing protocol. dynamically changing access frequencies and cache placements. As noted before, any changes in cache  However, note that maintaining cache-routing placements trigger updates in the nearest-cache table, tables instead of nearest-cache tables and which in turn affect the local benefit values. Below is a routing tables doesn’t offer any clear advantage summarized description of the DGA. in terms of number of messages transmissions. Algorithm 1: Distributed Greedy Algorithm (DGA) Setting  We could maintain the integrated cache-routing A network graph G(V;E) with p data items. tables in the similar vein as routing tables are maintained Each node i has a memory capacity of mi pages. Let  in mobile ad hoc networks. Alternatively, we could have be the benefit threshold. the servers periodically broadcast the latest cache lists. Program of Node i In our simulations, we adopted the latter strategy, since it BEGIN precludes the need to broadcast Add Cache and Delete When a data item Dj passes by Cache messages to some extent. if local memory has available space and (Bij >  ) 4. LOCALIZED CACHING POLICY then cache Dj  The caching policy of DGA is as follows. Each else if there is a set D of cached data items such node computes benefit of data items based on that(local benefit of D < Bij   and (|D|  |Dj |), ) its ―local traffic‖ observed for a sufficiently then replace D with Dj long time. The local traffic of a node i includes When a data item Dj is added to local cache its own local data requests, non-local data Notify the server of Dj requests to data items cached at i, and the traffic Broadcast an AddCache message with (i ,Dj) that the node i is forwarding to other nodes in When a data item Dj is deleted from local cache the network. Get the cache list Cj from the server of Dj Broadcast a DeleteCache message with  A node decides to cache the most beneficial (in (i’,Dj ,Cj) terms of local benefit per unit size of data item) On receiving an AddCache message data items that can fit in its local memory. (i’,Dj) When the local cache memory of a node is full, if i’ is nearer than current nearest- the following cache replacement policy is used. cache for Dj then update nearest-cache table entry  In particular, a data item is newly cached only if and broadcast the AddCache its local benefit is higher than the benefit message to neighbors threshold, and a data item replaces a set of else send the message to the nearest- cached data items only if the difference in their cache of i local benefits is greater than the benefit On receiving a DeleteCache message threshold. (i0, Dj, Cj ) if i’ is the current nearest-cache for Dj 6. DISTRIBUTED GREEEDY ALGORITHM then update the nearest-case of Dj (DGA) using Cj , and broadcast the Distributed Greedy Algorithm (DGA) is DeleteCache message also known as Distributed Caching Algorithm (DCA). else send the message to the nearest- The above components of nearest-cache cache of i table and cache replacement policy are combined to For mobile networks, instead of yield our Distributed Greedy Algorithm (DGA) for AddCache and DeleteCache cache placement problem. In addition, the server uses the messages, for each data item, its cache list to periodically update the server periodically broadcasts (to caches in response to changes to the data at the server. the entire network) the latest The departure of DGA from CGA is primarily in its cache list. inability to gather information about all traffic (access END. frequencies). 123 | P a g e
  • 5. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 Performance Analysis. Based on the above observation,  We have developed efficient data caching if we assume that local benefit is reflective of the algorithms to determine near optimal cache accurate benefit (i.e., if the local traffic seen by a node i placements to maximize reduction in overall is the only traffic that is affected by caching a data item access cost. Reduction in access cost leads to at node i), then DGA also yields a solution whose benefit communication cost savings and hence, better is one fourth of the optimal benefit. bandwidth usage and energy savings. Data Expiry and Cache Updates. We incorporate the concepts of data expiry and cache updates in our overall  However, our simulations over a wide range of framework as follows. For data expiry, we use the network and application parameters show that concept of Time-to-Live (TTL) [7], which is the time till the performance of the caching algorithms. which the given copy of the data item is considered valid/fresh. The data item or its copy is considered  Presents a distributed implementation based on expired at the an approximation algorithm for the problem of end of the TTL time value. We consider two data expiry cache placement of multiple data items under models, viz. TTL-per-request and TTL-per-item. In memory constraint. the TTL-per-request data expiry model [7], the server responds to any data item request with the requested  The result is the creation of content diversity data item and an appropriately generated TTL value. within the nodes neighborhood so that a Thus, each copy of the data item in the network is requesting user likely finds the desired associated with an independent TTL value. In the TTL- information nearby. per-item data expiry model, the server associates a TTL value with each data item (rather than each  We simulate our caching algorithms in different request), and all requests for the same data item are ad hoc network scenarios and compare them associated with the same TTL (until the data item with other caching schemes, showing that our expires). Thus, in the TTL-per-item data expiry model, solution succeeds in creating the desired content all the fresh copies of a data item in the network are diversity, thus leading to a resource-efficient associated with the same TTL value. On expiry of the information access. data item, the server generates a new TTL value for the data item. For updating the cached data items, we LIMITATIONS & FUTURE consider two mechanisms. For the case of TTL-per- ENHANCEMENTS : request data expiry model, we use the cache deletion Hamlet is caching self contained and is designed to self update model, where each cache node independently adapt to network environments with different mobility deletes its copy of the expired data item. Such and connectivity features. deletions are handled in the similar way as describe We assume a content distribution system where the before, i.e., by broadcasting a DeleteCache request. In following assumptions hold: the case of TTL-per-item data expiry model, all the copies of a particular data item expire simultaneously. 1) A number I of information items is available to the Thus, we use the server multicast cache update model, users, with each item divided into a number C of chunks; wherein the server multicasts the fresh copy of the data item to all the cache nodes, on expiration of the 2) User nodes can overhear queries for content and data item (at the server). If the cache list is not relative responses within their radio proximity by maintained at the server, then the above update is exploiting the broadcast nature of the wireless medium; implemented using a network wide broadcast and CONCLUSION: 3) User nodes can estimate their distance in hops from  Data caching strategy for ad hoc networks the query source and the responding node due to a hop- whose nodes exchange information items in a count field in the messages. Although Hamlet can work peer-to-peer fashion. Data caching is a fully with any system that satisfies the aforementioned three distributed scheme where each node, upon generic assumptions, for concreteness, we detail the receiving requested information, determines the features of the specific content retrieval system that we cache drop time of the information or which will consider in the remainder of this paper. content to replace for the newly arrived information. REFERENCE & BIBLIOGRAPHY:  We have developed a paradigm of data caching Good Teachers are worth more than thousand techniques to support effective data access in ad books, we have them in Our Department. hoc networks. In particular, we have considered [1] Caching Strategies Based on Information Density memory capacity constraint of the network Estimation in Wireless Ad Hoc NetworksMarco nodes. Fiore, Member, IEEE, Claudio Casetti, Member, IEEE, and Carla-Fabiana Chiasserini, Senior 124 | P a g e
  • 6. C.Srinivas, Samreen Khan / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, July-August 2012, pp.120-125 Member, IEEE IEEE TRANSACTIONS ON dissemination,‖ IEEE Trans. Knowl. Data Eng., VEHICULAR TECHNOLOGY, VOL. 60, NO. 5, vol. 16, no. 1, pp. 125–139, Jan. 2004. JUNE 2011 pg.no.1294 to pg.no.2028 [14] J. Cao, Y. Zhang, G. Cao, and L. Xie, ―Data [2] B.-J. Ko and D. Rubenstein, ―Distributed self- consistency for cooperative caching in mobile stabilizing placement of replicated resources in environments,‖ Computer, vol. 40, no. 4, pp. 60– emerging networks,‖ IEEE/ACM Trans. Netw., 66, Apr. 2007. vol. 13, no. 3, pp. 476–487, Jun. 2005. [15] N. Dimokas, D. Katsaros, and Y. Manolopoulos, [3] ―Benefit-based Data Caching in Ad Hoc ―Cache consistency in wireless multimedia sensor Networks ‖ Bin Tang, Member, IEEE, Himanshu networks,‖ Ad Hoc Netw., vol. 8, no. 2, pp. 214– Gupta, Member, IEEE, and Samir R. Das, 240, Mar. 2010. Member, IEEE [16] M. Fiore, F. Mininni, C. Casetti, and C.-F. [4] G. Cao, L. Yin, and C. R. Das, ―Cooperative Chiasserini, ―To cache or not to cache?‖ in Proc. cache-based data access in ad hoc networks,‖ IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. Computer, vol. 37, no. 2, pp. 32–39, Feb. 2004. 2009, pp. 235–243. [5] C.-Y. Chow, H. V. Leong, and A. T. S. Chan, REFERENCES MADE FROM: ―GroCoca: Group-based peer-to-peer cooperative caching in mobile environment,‖ IEEE J. Sel. 1. Professional Java Network Programming Areas Commun., vol. 25, no. 1, pp. 179–191, Jan. 2. Java Complete Reference 2007. 4. Data Communications and Networking, by Behrouz A Forouzan. [6] T. Hara, ―Cooperative caching by mobile clients 5. Computer Networking: A Top-Down Approach, by in push-based information systems,‖ in Proc. James F. Kurose. CIKM, 2002, pp. 186–193. 6. Operating System Concepts, by Abraham Silberschatz. [7] L. Yin and G. Cao, ―Supporting cooperative C.Srinivas M.Tech Associate Professor , HOD caching in ad hoc networks,‖ IEEE Trans. Mobile IT Department, Sree Visvesvraya Institute of technology Comput., vol. 5, no. 1, pp. 77–89, Jan. 2006. and Sciences affiliated to JNTUH, approved by AICTE New Delhi, Mahabubnagar. His research includes [8] N. Dimokas, D. Katsaros, and Y. Manolopoulos, Information security , Networking ―Cooperative caching in wireless multimedia sensor networks,‖ ACM Mobile Netw. Appl., vol. 13, no. 3/4, pp. 337–356, Aug. 2008. Samreen Khan pursuing M.Tech CSE [9] Y. Du, S. K. S. Gupta, and G. Varsamopoulos, final year in Sree Visvesvaraya ―Improving on-demand data access efficiency in Institute of Technology and Science MANETs with cooperative caching,‖ Ad Hoc affiliated to JNTUH, approved by Netw., vol. 7, no. 3, pp. 579–598, May 2009. AICTE New Delhi. Chowderpally Mahabubnagar. [10] W. Li, E. Chan, and D. Chen, ―Energy-efficient Research area includes Java cache replacement policies for cooperative computer network, information security . caching in mobile ad hoc network,‖ in Proc. IEEE WCNC, Kowloon, Hong Kong, Mar. 2007, pp. 3347–3352. [11] M. K. Denko and J. Tian, ―Cross-layer design for cooperative caching in mobile ad hoc networks,‖ in Proc. IEEE CCNC, Las Vegas, NV, Jan. 2008, pp. 375–380. [12] H. Chen, Y. Xiao, and X. Shen, ―Update-based cache replacement policies in wireless data access,‖ in Proc. BroadNets, Boston, MA, Oct. 2005, pp. 797–804. [14] J. Xu, Q. Hu, W.-C. Lee, and D. L. Lee, ―Performance evaluation of an optimal cache replacement policy for wireless data 125 | P a g e