Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Sebin Joseph
Active In SP
**

Posts: 1
Joined: Jul 2010
#1
28-07-2010, 11:24 AM


i need a full abstract on the topic 'Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks'
Reply
project report helper
Active In SP
**

Posts: 2,270
Joined: Sep 2010
#2
18-09-2010, 01:07 PM

More Info About Exploiting In-Zone Broadcasts for Cache Sharing in Mobile Ad Hoc Networks


Abstract

The problem of cache sharing for supporting data access in mobile ad hoc networks is studied in this paper. The key to this problem is to discover a requested data item in an efficient manner. In the paper, we propose two caching protocols, IXP and DPIP, which distinguish themselves from the existing ones in that they fully exploit in-zone broadcasts to facilitate cache sharing operation. In particular, the DPIP protocol offers an implicit index push property, which is highly useful for enhancing cache hit ratio in the neighborhood of a data requester node. Moreover, our protocols also exploit the broadcasts to facilitate the design of a simple but efficient count-based cache replacement scheme. Performance study shows that the proposed protocols can significantly improve the performance of data access in a mobile ad hoc network.


refered by : Issue Date: March 2009
Volume: 8 Issue:3
On page(s): 384 - 397
ISSN: 1536-1233
INSPEC Accession Number: 10401552
Digital Object Identifier: 10.1109/TMC.2008.127
Date of Publication: 12 September 2008
Date of Current Version: 20 January 2009
Sponsored by: IEEE Computer Society
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
Question Optimal Stochastic Location Updates in Mobile Ad Hoc Networks Guest 5 1,542 01-05-2014, 09:10 AM
Last Post: Guest
  SECURE DATA COLLECTION IN WIRELESS SENSOR NETWORKS USING RANDOMIZED DISPERSIVE ROUTES Guest 3 2,051 07-03-2014, 04:24 PM
Last Post: seminar project topic
  AUTOMATICE MOBILE RECHARGE STATION Guest 0 555 16-10-2013, 06:27 PM
Last Post: Guest
  INTELLIGENT MOBILE ROBOT NAVIGATION TECHNOLOGY USING RFID sindumanickam 4 3,215 08-10-2013, 09:54 PM
Last Post: Guest
Question mobile shield abstract with full details mallistar 4 2,894 21-09-2013, 04:54 PM
Last Post: seminar projects maker
Bug mobile phone controlled four legged walking robot with speed and direction control alakasp.8 6 5,443 06-08-2013, 08:27 PM
Last Post: Guest
  Cognitive Radio for Exploiting Underused Spectrum risi4real 0 339 24-07-2013, 03:40 PM
Last Post: risi4real
  Link Positions Matter: A Non-Commutative Routing Metric for Wireless Mesh Networks Guest 0 441 27-06-2013, 09:03 PM
Last Post: Guest
  device control using mobile phone Guest 1 555 29-05-2013, 09:10 AM
Last Post: study tips
  An Adaptive Opportunistic Routing for Wireless Ad-hoc Networks Guest 1 878 20-05-2013, 09:38 AM
Last Post: study tips