MINING FILE DOWNLOADING TIME IN STOCHASTIC PEER TO PEER NETWORKS-NETWORKING
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
electronics seminars
Active In SP
**

Posts: 694
Joined: Nov 2009
#1
13-01-2010, 07:14 AM


Abstract:
MINING FILE DOWNLOADING TIME IN STOCHASTIC PEER TO PEER NETWORKS-NETWORKING

Abstract: On-demand routing protocols use route caches to make routing decisions. Due to mobility, cached routes easily become stale. To address the cache staleness issue, prior work in DSR used heuristics with ad hoc parameters to predict the lifetime of a link or a route. However, heuristics cannot accurately estimate timeouts because topology changes are unpredictable. In this paper, we propose proactively disseminating the broken link information to the nodes that have that link in their caches. We define a new cache structure called a cache table and present a distributed cache update algorithm. Each node maintains in its cache table the information necessary for cache updates. When a link failure is detected, the algorithm notifies all reachable nodes that have cached the link in a distributed manner. The algorithm does not use any ad hoc parameters, thus making route caches fully adaptive to topology changes. We show that the algorithm outperforms DSR with path caches and with Link-Max Life, an adaptive timeout mechanism for link caches. We conclude that proactive cache updating is key to the adaptation of on-demand routing protocols to mobility.




Technology:.NET
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Switching and Traffic Grooming in WDM Networks at java project topics 3 951 09-09-2016, 02:27 PM
Last Post: Dhanabhagya
  Time Table Generator for Colleges Electrical Fan 24 18,201 02-01-2016, 04:22 PM
Last Post: mkaasees
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 3 2,747 09-12-2014, 09:25 PM
Last Post: Guest
  data mining full report project report tiger 35 199,216 03-10-2014, 04:30 AM
Last Post: kwfEXGu
  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks seminar flower 4 1,808 02-06-2014, 09:51 AM
Last Post: seminar project topic
  Hop-by-Hop Routing in Wireless Mesh Networks with Bandwidth Guarantees Abstract seminar projects maker 2 760 08-03-2014, 12:43 PM
Last Post: seminar project topic
  FULL REPORT ON ONLINE SOCIAL NETWORKING seminar projects maker 0 486 30-09-2013, 03:54 PM
Last Post: seminar projects maker
  Identifying Evolving Groups in Dynamic Multimode Networks Projects9 2 1,140 30-09-2013, 10:54 AM
Last Post: Guest
  Routing Security in Ad Hoc Wireless Networks seminar projects maker 0 554 26-09-2013, 02:20 PM
Last Post: seminar projects maker
  Adaptation in Reputation Management Systems for Ad hoc Networks seminar projects maker 0 383 26-09-2013, 02:09 PM
Last Post: seminar projects maker