A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 2
Abstract
This paper proposes a new hashing and caching strategy (NHC) in order to reduce the overall location management cost in wireless mobile networks. It uses caches whose up-to-date information is responsible for dropping this cost and these caches are updated not only at call arrival time from the calling Mobile Terminals (MTs) but also at call receiving time to those MTs, and even at location registration time. To achieve load balancing among replicated Home Location Registers (HLRs), hashing technique is used and this load is also affected by the up-to-date cache information. The analytical modeling and numerical results show that our proposed method more frequently prepares the caches with up-to-date information with the increase of average call arrival rate, average call receiving rate, and even with MT’s increased mobility rate. This increases the probability of finding called MT’s location as well as hit ratio in the caches. As a result, the overall location management cost including load on a particular location server (HLR) are minimized considerably than all other previous approaches.
Authors and Affiliations
Md. Mohsin Ali , Md. Kowsar Hossai , Md. Amjad Hossain
AN INSTINCTIVE APPROACH FOR SECURE COMMUNICATION - ENHANCED DATA ENCRYPTION STANDARD (EHDES)
In this article, we establish a new architecture of information security for secure or more secure communication in network. Data encryption process is the main precious and important for secure transaction of informatio...
Synthesis of DSP Systems using Data Flow Graphs for Silicon Area Reduction
This paper presents a methodology to reduce the area of DSP architecture on silicon using folding. Folding is particularly important and has impact on large DSP circuits/architectures. This technique is powerful to redu...
Operating System based Compliance Validation of Trusted Computing
The concept of trusted computing given was by Anderson [2]. Trust is an expectation that a device behaves in a particular manner. A trusted component, operation or process is one whose behavior is pr...
Caching Technique for Improving Data Retrieval Performance in Mobile Ad Hoc Networks
Mobile Ad Hoc Networks (MANETs) provide an attractive solution for networking in the situations where network infrastructure or service subscription is not available. Cooperative caching scheme can improve the acces...
A WEB BASED TOMATO CROP EXPERT INFORMATION SYSTEM BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING ALGORITHM
Tomato is now the most widely grown vegetable crop in World. It is grown throughout the world in farm gardens, small home-gardens, and by market gardeners for fresh consumption as well as for pr...