Scheduling Cached-Content in Wireless Networks With Elastic and Inelastic Traffic

Abstract

With the exponential growth of wireless content access, the need for content placement and scheduling at wireless base stations increased rapidly. We study a system under which users are divided into clusters based on their channel conditions, and their requests are represented by different queues at logical front ends. Requests might be elastic (implying no hard delay constraint) or inelastic (requiring that a delay target be met). Correspondingly, we have request queues that indicate the number of elastic requests, and deficit queues that indicate the deficit in inelastic service. Caches are of finite size and can be refreshed periodically from a media vault. We consider two cost models that correspond to inelastic requests for streaming stored content and real-time streaming of events, respectively. We design provably optimal policies that stabilize the request queues (hence ensuring finite delays) and reduce average deficit to zero [hence ensuring that the quality-of-service (QoS) target is met] at small cost. We illustrate our approach through simulations.

Authors and Affiliations

Syed Ajmal Pasha C| M.Tech (CSE), Nimra College of Engineering & Technology, A.P., India, Sayeed Yasin| Assoc.profissor & HOD of Computer Science & Engineering, Nimra College of Engineering & Technology, A.P., India

Keywords

Related Articles

Two Dimensional Data Structure to Record Data Property Information For Dynamic Auditing

A novel public auditing plan for secure distributed storage in light of dynamic hash table (DHT), which is another two-dimensional information structure situated at a third parity auditor (TPA) to record the informat...

A proficient document chain of importance characteristic based encryption plot is proposed in distributed computing. The layered access structures are coordinated into a solitary access structure, and after that, the...

The cloud Approach for Consistent Appropriate deduplication

In Cloud processing includes conveying gatherings of remote servers and programming systems that permit brought together information stockpiling and online access to PC administrations or assets. Mists can be named o...

Detection of Masquerade Attacks using Data-Driven Semi-Global Alignment Approach

The broad utilization of virtualization in representing security basis conveys unrivaled security worries for inhabitants or clients and presents an extra layer that itself must be totally arranged and secured. Gatec...

Vampire Attacks: Draining Life From Wireless Adhoc Sensor Networks

Ad hoc less power wireless networks are one of the current topics in the field of security and pervasive computing. Most of the research work done before for improving the security of the networks in this area is main...

Download PDF file
  • EP ID EP16540
  • DOI -
  • Views 302
  • Downloads 24

How To Cite

Syed Ajmal Pasha C, Sayeed Yasin (2015). Scheduling Cached-Content in Wireless Networks With Elastic and Inelastic Traffic. International Journal of Science Engineering and Advance Technology, 3(9), 411-414. https://europub.co.uk/articles/-A-16540