SlideShare ist ein Scribd-Unternehmen logo
1 von 7
COOPERATIVE CACHING FOR EFFICIENT DATA 
ACCESS IN DISRUPTION TOLERANT NETWORKS 
ABSTRACT: 
Disruption tolerant networks (DTNs) are characterized by 
low node density, unpredictable node mobility, and lack of 
global network information. Most of current research efforts in 
DTNs focus on data forwarding, but only limited work has been 
done on providing efficient data access to mobile users. In this 
paper, we propose a novel approach to support cooperative 
caching in DTNs, which enables the sharing and coordination of 
cached data among multiple nodes and reduces data access 
delay. Our basic idea is to intentionally cache data at a set of 
network central locations (NCLs), which can be easily accessed 
by other nodes in the network. We propose an efficient scheme 
that ensures appropriate NCL selection based on a probabilistic 
selection metric and coordinates multiple caching nodes to 
optimize the tradeoff between data accessibility and caching 
overhead. Extensive trace-driven simulations show that our
approach significantly improves data access performance 
compared to existing schemes. 
EXISTING SYSTEM: 
Although forwarding schemes have been proposed in 
DTNs there is limited research on providing efficient data access 
to mobile users, despite the importance of data accessibility in 
many mobile applications. For example, it is desirable that 
smartphone users can find interesting digital content from their 
nearby peers. In vehicular ad-hoc networks (VANETs), the 
availability of live traffic information will be beneficial for 
vehicles to avoid traffic delays. In these applications, data are 
only requested by mobile users whenever needed, and requesters 
do not know data locations in advance. The destination of data 
is, hence, unknown when data are generated. This 
communication paradigm differs from publish/subscribe systems 
in which data are forwarded by broker nodes to users according 
to their data subscriptions. Appropriate network design is
needed to ensure that data can be promptly accessed by 
requesters in such cases. 
DISADVANTAGES OF EXISTING SYSTEM: 
· It makes difficult to determine appropriate caching 
locations for reducing data access delay. 
· It is hard to optimize the tradeoff between data accessibility 
and caching overhead. 
PROBLEM STATEMENT: 
DISRUPTION tolerant networks (DTNs) [14] consist of 
mobile devices that contact each other opportunistically. Due to 
the low node density and unpredictable node mobility, only 
intermittent network connectivity exists in DTNs, and the 
subsequent difficulty of maintaining end-to end communication 
links makes it necessary to use “carry and- forward” methods for 
data transmission. 
SCOPE: 
The basic idea is to intentionally cache data at a set of 
network central locations (NCLs).
PROPOSED SYSTEM: 
We propose a novel scheme to address the afore 
mentioned challenges and to efficiently support cooperative 
caching in DTNs. Our basic idea is to intentionally cache data at 
a set of network central locations (NCLs), each of which 
corresponds to a group of mobile nodes being easily accessed by 
other nodes in the network. Each NCL is represented by a 
central node, which has high popularity in the network and is 
prioritized for caching data. Due to the limited caching buffer of 
central nodes, multiple nodes near a central node may be 
involved for caching, and we ensure that popular data are always 
cached nearer to the central nodes via dynamic cache 
replacement based on query history. Our detailed contributions 
are listed as follows: 
· We develop an efficient approach to NCL selection in 
DTNs based on a probabilistic selection metric. The 
selected NCLs achieve high chances for prompt response to
user queries with low overhead in network storage and 
transmission. 
· We propose a data access scheme to probabilistically 
coordinate multiple caching nodes for responding to user 
queries. We furthermore optimize the tradeoff between data 
accessibility and caching overhead, to minimize the 
average number of cached data copies in the network. 
· We propose a utility-based cache replacement scheme to 
dynamically adjust cache locations based on query history, 
and our scheme achieves good tradeoff between the data 
accessibility and access delay. 
ADVANTAGES OF PROPOSED SYSTEM: 
· Popular data are always cached nearer to the central nodes 
via dynamic cache replacement. 
· It is an efficient technique.
SYSTEM CONFIGURATION:- 
HARDWARE REQUIREMENTS:- 
 Processor - Pentium –IV 
 Speed - 1.1 Ghz 
 RAM - 512 MB(min) 
 Hard Disk - 40 GB 
 Key Board - Standard Windows Keyboard 
 Mouse - Two or Three Button Mouse 
 Monitor - LCD/LED 
SOFTWARE REQUIREMENTS: 
• Operating system : Windows XP 
• Coding Language : Java 
• Data Base : MySQL 
• Tool : Net Beans IDE
REFERENCE: 
Wei Gao, Guohong Cao, Arun Iyengar and Mudhakar Srivatsa, “Cooperative 
Caching for Efficient Data Access in Disruption Tolerant Networks” IEEE 
TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014

Weitere ähnliche Inhalte

Was ist angesagt?

Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
Vinoth Chandar
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
Bittu Roy
 
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
Tal Lavian Ph.D.
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
revathiyadavb
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsn
TAIWAN
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
ijasuc
 

Was ist angesagt? (18)

CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
CONTENT BASED DATA TRANSFER MECHANISM FOR EFFICIENT BULK DATA TRANSFER IN GRI...
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
Distributeddatabasesforchallengednet
DistributeddatabasesforchallengednetDistributeddatabasesforchallengednet
Distributeddatabasesforchallengednet
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
A Platform for Large-Scale Grid Data Service on Dynamic High-Performance Netw...
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
Computational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsnComputational intelligence based data aggregation technique in clustered wsn
Computational intelligence based data aggregation technique in clustered wsn
 
SDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering ProtocolSDC: A Distributed Clustering Protocol
SDC: A Distributed Clustering Protocol
 
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
Content Distribution for Peer-To-Peer Overlays on Mobile Adhoc Networks to Fu...
 
Ns2422412247
Ns2422412247Ns2422412247
Ns2422412247
 
Caching on Named Data Network: a Survey and Future Research
Caching on Named Data Network: a Survey  and Future Research Caching on Named Data Network: a Survey  and Future Research
Caching on Named Data Network: a Survey and Future Research
 
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
Exploiting Wireless Networks, through creation of Opportunity Network – Wirel...
 
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
IEEE 2014 DOTNET NETWORKING PROJECTS Leveraging social networks for p2 p cont...
 
Delay Tolerant Network - Presentation
Delay Tolerant Network - PresentationDelay Tolerant Network - Presentation
Delay Tolerant Network - Presentation
 
Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesDistributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
 

Andere mochten auch

Andere mochten auch (20)

expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...expressive, efficient, and revocable data access control for multi authority ...
expressive, efficient, and revocable data access control for multi authority ...
 
An exploration of geographic authentication schemes
An exploration of geographic authentication schemesAn exploration of geographic authentication schemes
An exploration of geographic authentication schemes
 
Design of an information system for HUNETs
Design of an information system for HUNETsDesign of an information system for HUNETs
Design of an information system for HUNETs
 
towards differential query services in cost-efficient clouds
towards differential query services in cost-efficient cloudstowards differential query services in cost-efficient clouds
towards differential query services in cost-efficient clouds
 
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420  Efficient Prediction of Difficult Keyword Queries over DatabasesJPJ1420  Efficient Prediction of Difficult Keyword Queries over Databases
JPJ1420 Efficient Prediction of Difficult Keyword Queries over Databases
 
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing PlatformJPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
JPJ1416 BestPeer++: A Peer-to-Peer Based Large-Scale Data Processing Platform
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT The client assignment problem for...
 
Scalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaSScalable distributed service integrity for SaaS
Scalable distributed service integrity for SaaS
 
Woral Seminar port
Woral Seminar portWoral Seminar port
Woral Seminar port
 
scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...scalable distributed service integrity attestation for software-as-a-service ...
scalable distributed service integrity attestation for software-as-a-service ...
 
Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...Traffic pattern based content leakage detection for trusted content delivery ...
Traffic pattern based content leakage detection for trusted content delivery ...
 
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery EngineJPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
JPJ1440 RRE: A Game-Theoretic Intrusion Response and Recovery Engine
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
2014 IEEE JAVA CLOUD COMPUTING PROJECT Distributed, concurrent, and independe...
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS InformationJPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
JPJ1453 Web Service Recommendation via Exploiting Location and QoS Information
 
accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...accuracy-constrained privacy preserving access control mechanism for relation...
accuracy-constrained privacy preserving access control mechanism for relation...
 
Privacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networksPrivacy preserving location sharing services for social networks
Privacy preserving location sharing services for social networks
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Dealing with concept drifts in process mining
Dealing with concept drifts in process miningDealing with concept drifts in process mining
Dealing with concept drifts in process mining
 

Ähnlich wie Cooperative caching for efficient data access in disruption tolerant networks

Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
Mumbai Academisc
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
ijasuc
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
Arul Suju
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
cscpconf
 

Ähnlich wie Cooperative caching for efficient data access in disruption tolerant networks (20)

cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
Cooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networksCooperative caching for efficient data access in disruption tolerant networks
Cooperative caching for efficient data access in disruption tolerant networks
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
 
Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...Transfer reliability and congestion control strategies in opportunistic netwo...
Transfer reliability and congestion control strategies in opportunistic netwo...
 
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
JAVA 2013 IEEE NETWORKING PROJECT Transfer reliability and congestion control...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)Benefit based data caching in ad hoc networks (synopsis)
Benefit based data caching in ad hoc networks (synopsis)
 
P24120125
P24120125P24120125
P24120125
 
Scalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storagesScalable and adaptive data replica placement for geo distributed cloud storages
Scalable and adaptive data replica placement for geo distributed cloud storages
 
Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...Mobile data gathering with load balanced clustering and dual data uploading i...
Mobile data gathering with load balanced clustering and dual data uploading i...
 
Review on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor NetworkReview on Clustering and Data Aggregation in Wireless Sensor Network
Review on Clustering and Data Aggregation in Wireless Sensor Network
 
pxc3903794
pxc3903794pxc3903794
pxc3903794
 
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
A COST EFFECTIVE COMPRESSIVE DATA AGGREGATION TECHNIQUE FOR WIRELESS SENSOR N...
 
P2P Cache Resolution System for MANET
P2P Cache Resolution System for MANETP2P Cache Resolution System for MANET
P2P Cache Resolution System for MANET
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
B0330811
B0330811B0330811
B0330811
 
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
A TIME INDEX BASED APPROACH FOR CACHE SHARING IN MOBILE ADHOC NETWORKS
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
 
Mobile data gathering with load balanced
Mobile data gathering with load balancedMobile data gathering with load balanced
Mobile data gathering with load balanced
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 

Mehr von Papitha Velumani

Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
Papitha Velumani
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
Papitha Velumani
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
Papitha Velumani
 

Mehr von Papitha Velumani (20)

2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java2015 - 2016 IEEE Project Titles and abstracts in Java
2015 - 2016 IEEE Project Titles and abstracts in Java
 
2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android 2015 - 2016 IEEE Project Titles and abstracts in Android
2015 - 2016 IEEE Project Titles and abstracts in Android
 
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet 2015 - 2016 IEEE Project Titles and abstracts in Dotnet
2015 - 2016 IEEE Project Titles and abstracts in Dotnet
 
Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks Trajectory improves data delivery in urban vehicular networks
Trajectory improves data delivery in urban vehicular networks
 
Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...Tracon interference aware scheduling for data-intensive applications in virtu...
Tracon interference aware scheduling for data-intensive applications in virtu...
 
Supporting privacy protection in personalized web search
Supporting privacy protection in personalized web searchSupporting privacy protection in personalized web search
Supporting privacy protection in personalized web search
 
Stochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random serviceStochastic bandwidth estimation in networks with random service
Stochastic bandwidth estimation in networks with random service
 
Sos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networksSos a distributed mobile q&a system based on social networks
Sos a distributed mobile q&a system based on social networks
 
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
Real time misbehavior detection in ieee 802.11-based wireless networks an ana...
 
Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...Probabilistic consolidation of virtual machines in self organizing cloud data...
Probabilistic consolidation of virtual machines in self organizing cloud data...
 
Privacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud dataPrivacy preserving multi-keyword ranked search over encrypted cloud data
Privacy preserving multi-keyword ranked search over encrypted cloud data
 
Privacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queriesPrivacy preserving and content-protecting location based queries
Privacy preserving and content-protecting location based queries
 
Occt a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkageOcct a one class clustering tree for implementing one-to-man data linkage
Occt a one class clustering tree for implementing one-to-man data linkage
 
Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...Leveraging social networks for p2p content based file sharing in disconnected...
Leveraging social networks for p2p content based file sharing in disconnected...
 
LDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networksLDBP: localized boundary detection and parametrization for 3 d sensor networks
LDBP: localized boundary detection and parametrization for 3 d sensor networks
 
Integrity for join queries in the cloud
Integrity for join queries in the cloudIntegrity for join queries in the cloud
Integrity for join queries in the cloud
 
Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...Improving fairness, efficiency, and stability in http based adaptive video st...
Improving fairness, efficiency, and stability in http based adaptive video st...
 
Hybrid attribute and re-encryption-based key management for secure and scala...
Hybrid attribute  and re-encryption-based key management for secure and scala...Hybrid attribute  and re-encryption-based key management for secure and scala...
Hybrid attribute and re-encryption-based key management for secure and scala...
 
Friendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networksFriendbook a semantic based friend recommendation system for social networks
Friendbook a semantic based friend recommendation system for social networks
 
Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords Fast nearest neighbor search with keywords
Fast nearest neighbor search with keywords
 

Kürzlich hochgeladen

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Kürzlich hochgeladen (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 

Cooperative caching for efficient data access in disruption tolerant networks

  • 1. COOPERATIVE CACHING FOR EFFICIENT DATA ACCESS IN DISRUPTION TOLERANT NETWORKS ABSTRACT: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node mobility, and lack of global network information. Most of current research efforts in DTNs focus on data forwarding, but only limited work has been done on providing efficient data access to mobile users. In this paper, we propose a novel approach to support cooperative caching in DTNs, which enables the sharing and coordination of cached data among multiple nodes and reduces data access delay. Our basic idea is to intentionally cache data at a set of network central locations (NCLs), which can be easily accessed by other nodes in the network. We propose an efficient scheme that ensures appropriate NCL selection based on a probabilistic selection metric and coordinates multiple caching nodes to optimize the tradeoff between data accessibility and caching overhead. Extensive trace-driven simulations show that our
  • 2. approach significantly improves data access performance compared to existing schemes. EXISTING SYSTEM: Although forwarding schemes have been proposed in DTNs there is limited research on providing efficient data access to mobile users, despite the importance of data accessibility in many mobile applications. For example, it is desirable that smartphone users can find interesting digital content from their nearby peers. In vehicular ad-hoc networks (VANETs), the availability of live traffic information will be beneficial for vehicles to avoid traffic delays. In these applications, data are only requested by mobile users whenever needed, and requesters do not know data locations in advance. The destination of data is, hence, unknown when data are generated. This communication paradigm differs from publish/subscribe systems in which data are forwarded by broker nodes to users according to their data subscriptions. Appropriate network design is
  • 3. needed to ensure that data can be promptly accessed by requesters in such cases. DISADVANTAGES OF EXISTING SYSTEM: · It makes difficult to determine appropriate caching locations for reducing data access delay. · It is hard to optimize the tradeoff between data accessibility and caching overhead. PROBLEM STATEMENT: DISRUPTION tolerant networks (DTNs) [14] consist of mobile devices that contact each other opportunistically. Due to the low node density and unpredictable node mobility, only intermittent network connectivity exists in DTNs, and the subsequent difficulty of maintaining end-to end communication links makes it necessary to use “carry and- forward” methods for data transmission. SCOPE: The basic idea is to intentionally cache data at a set of network central locations (NCLs).
  • 4. PROPOSED SYSTEM: We propose a novel scheme to address the afore mentioned challenges and to efficiently support cooperative caching in DTNs. Our basic idea is to intentionally cache data at a set of network central locations (NCLs), each of which corresponds to a group of mobile nodes being easily accessed by other nodes in the network. Each NCL is represented by a central node, which has high popularity in the network and is prioritized for caching data. Due to the limited caching buffer of central nodes, multiple nodes near a central node may be involved for caching, and we ensure that popular data are always cached nearer to the central nodes via dynamic cache replacement based on query history. Our detailed contributions are listed as follows: · We develop an efficient approach to NCL selection in DTNs based on a probabilistic selection metric. The selected NCLs achieve high chances for prompt response to
  • 5. user queries with low overhead in network storage and transmission. · We propose a data access scheme to probabilistically coordinate multiple caching nodes for responding to user queries. We furthermore optimize the tradeoff between data accessibility and caching overhead, to minimize the average number of cached data copies in the network. · We propose a utility-based cache replacement scheme to dynamically adjust cache locations based on query history, and our scheme achieves good tradeoff between the data accessibility and access delay. ADVANTAGES OF PROPOSED SYSTEM: · Popular data are always cached nearer to the central nodes via dynamic cache replacement. · It is an efficient technique.
  • 6. SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 512 MB(min)  Hard Disk - 40 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - LCD/LED SOFTWARE REQUIREMENTS: • Operating system : Windows XP • Coding Language : Java • Data Base : MySQL • Tool : Net Beans IDE
  • 7. REFERENCE: Wei Gao, Guohong Cao, Arun Iyengar and Mudhakar Srivatsa, “Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 13, NO. 3, MARCH 2014