Information Density Cache Strategy in Wireless Ad-Hoc Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
Data caching strategy for ad hoc networks whose nodes exchange information items in a peer to peer fashion. Data caching is a fully distributes scheme where each node upon receiving request information determines the cache drop time of the information or which content to replace to make room for the newly arrives information. These decisions are made depending on to the perceives “presence” of the content in the nodes proximity whose estimation does not cause any additional overhead to the information sharing system. We devise to strategy where nodes are independent of each other decide whether to cache some content and for how long. In the case of small size caches we aim to design a content replacement strategy that allows nodes to successfully store newly received information while maintaining the good performance of the content distribution system.
Authors and Affiliations
Bandi Bhaskar, R. Swapna
Quality of Services in 4G networks
Due to the difference between the access technologies and the disparity of application's QoS requirements, there is a significant need to make available a unified approach that integrates all useful access networks....
A Systematic Approach For Testing And Debugging Networks Called Atpg
ATPG recognize router configurations and produces a device-independent model. The imitation is used to make a minimum set of test packets to simply put into effect every link in the network or maximally exercise ever...
Access Control And Privacy Preserving Mechanisms On Sensitive Data
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....
Minimizing Network Overhead In MANET Using Elliptic Curve Cryptography
In this paper, we propose and implement a new intrusion-detection system with ECC Algorithm specially designed for MANETs. The self-configuring ability of nodes in MANET made it popular among critical mission applica...
Secured Diversified Data set Selection From Dynamic Data
Once the data is created, the data that it contains doesn’t change is known as static data (ex: newspaper).Where as the data can be change and update in the dynamic data (ex: website). A lot of information available...