Replica Allocation over a Mobile Ad Hoc Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Mobile ad hoc network leads to network partitioning or performance degradation when the mobile nodes mobility occur or less stability of resource contents in it. Researchers developed many methods to minimize the performance degradation most of the methods are based on memory space sharing between the nodes. But some of the nodes will not cooperate fully, they partially support and we call these nodes as selfish nodes. These nodes reduce the overall data accessibility in the network. Finally To achieve fair replica allocation among the mobile nodes in the network and makes the reallocation decisions in mobile nodes collaborative.,inovative technique is used named as Collaborative Allocation and Reallocation of replicas with efficiency. This paper examine these selfish node based on the replica allocation to the different nodes in the network. Here the simulations show that this approach is better than the traditional replica allocation in many ways.
Authors and Affiliations
Y. Manga Devi, K. Devi Priya
Multivariate Link Analysis Approach Against DOS Attacks
Over the net, in our regular life we keep an eye on zone unit working with interconnect frameworks like web servers, data servers, and distributed computing servers. These region unit the frameworks that region unit...
A Comparative Study for Slot-Loaded Compact Microstrip Antennas by Using Methods Based on FDTD, FEM and MoM
A comparativestudy on the performance of the computational electromagnetic methods (CEMs) namely finite difference time domain (FDTD), finite element method (FEM) and moment method (MoM) via their corresponding elect...
Algorithmic Procedure to Produce Near Optimal Interactivity And Reduce The Interaction Time Between Clients
Latency-driven distribution of servers is necessary even when there are no limits on the ease of use of server income at one location. In a distributed server structural design, the state of a DIA such as the effecti...
Methods To Enhance The Security And Embedding Capacity Of Steganography
The major requirement for most of the steganographic method is to improve the security to the hidden data and to enhance the amount of data that can be embedded into the cover medium. The paper mainly studies on the...
Design and Development of Mobile Assisted Language Learning (MALL) application for English Language using Android Push Notification Services
The pervasive nature of the mobile devices and the wide array of mobile learning applications enables the acceptance of mobile devices as an indispensable component in the current pedagogical learner-centric mode of...