Peer to Peer Cooperation for Caching in Wireless Networks
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2012, Vol 3, Issue 10
Abstract
Some recent studies have shown that cooperative cache can improve the system performance in wireless P2P networks such as ad hoc networks and mesh networks. All these studies are at a very high level, leaving many design and implementation issues unanswered. In this project, design and implementation of cooperative cache in wireless P2P networks is considered, and solutions to find the best place to perform caching is proposed. A novel asymmetric cooperative cache approach is proposed, where few nodes need to cache the status of the nodes in their vicinity. This solution reduces the overhead of all nodes caching status of all other nodes. The results show that the asymmetric approach outperforms the symmetric approach in traditional 802.11-based ad hoc networks by removing most of the processing overhead.
Authors and Affiliations
A. Aruna Jyothi , N. Sravani
A Survey on Resource Allocation Strategies in Cloud
The cloud computing is an emerging technology in the era of Internet. It is advancement to grid computing. Basically cloud computing is combination of distributed, parallel and grid computing. The cloud is a shared pool...
CLASSIFICATION TECHNIQUES APPLIED FOR INTRUSION DETECTION
Intrusion detection system (IDS) was designed to monitor the network activity and it identifies the normal and abnormal behavioral pattern in the network. If there was any abnormal pattern, it indicates the system is in...
SPEECH WATERMARKING USING DISCRETE WAVELET TRANSFORM, DISCRETE COSINE TRANSFORM AND SINGULAR VALUE DECOMPOSITION
The main goal of this paper is to embed a watermark in the speech signal, using the three techniques such as Discrete Cosine Transform (DCT) along with Singular Value Decomposition (SVD) and Discrete Wavelet Transform (D...
Methodology and Analysis for Various SQL Injection Techniques
Now day’s online transaction is done by most of web applications. These applications have vulnerabilities which make its security weak. Every application has provided authentication and authorization functionality, secur...
Discrete & Continuous Mouse Motion Using Vocal & Non Vocal Characteristics of Human Voice.
Mouse control today has become an important tool to interact with computers. It is quite easy for those who are physically fit and mentally sound, but for those who are suffering from physical disabilities, It is quite d...