ASYNCHRONOUS CHECKPOINTING AND OPTIMISTIC MESSAGE LOGGING FOR MOBILE AD HOC NETWORKS
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2011, Vol 2, Issue 10
Abstract
In recent years the advancements in wireless communication technology and mobile computing fueled a steady increase in both number and types of applications for wireless networks. Wireless networks can roughly be classified into cellular networks which use dedicated infrastructure (like base stations) and ad hoc networks without infrastructure. A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that can communicate with each other using Multihop wireless links without using any fixed infrastructure and centralized controller. Since this type of networks exhibits a dynamic topology, that is, the nodes move very frequently, it is hard to establish some intermittent connectivity in this scenario. Fault tolerance is one of the key issues for MANETs. In a cluster federation, clusters are gathered to provide huge computing power. Clustering methods allow fast connection and also better routing and topology management of mobile ad hoc networks (MANET). To work efficiently on such systems, networks characteristics have to be taken into account, for e.g. the latency between two nodes of different clusters is much higher than the latency between two nodes of the same cluster. In this paper, we present a message logging protocol well-suited to provide fault tolerance for cluster federations in mobile ad hoc networks. The proposed scheme is based on optimistic message logging.
Authors and Affiliations
RUCHI TULI , PARVEEN KUMAR
Predicting CO2 Emissions from Farm Inputs in Wheat Production using Artificial Neural Networks and Linear Regression Models
Two models have been developed for simulating CO2 emissions from wheat farms: (1) an artificial neural network (ANN) model; and (2) a multiple linear regression model (MLR). Data were collected from 40 wheat farms in the...
Performance Analysis of Machine Learning Algorithms for Missing Value Imputation
Data mining requires a pre-processing task in which the data are prepared, cleaned, integrated, transformed, reduced and discretized for ensuring the quality. Missing values is a universal problem in many research domain...
A New Healthcare Context Information: The Social Context
During the treatment process, medical institutes collect context information about their patients and store it in their healthcare systems. The collected information describes the measurable, risk, or medication informat...
Internet Forensics Framework Based-on Clustering
Internet network attacks are complicated and worth studying. The attacks include Denial of Service (DoS). DoS attacks that exploit vulnerabilities found in operating systems, network services and applications. Indicators...
Knowledge Management Strategyfor SMEs
In Thailand, as in other developing countries, the focus was on the large industry first, since governments assumed that large enterprises could generate more employment. However, there has been a realization that the SM...