International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 Adaptive Opportunistic Routing based on Hamlet Framework for Wireless Ad Hoc Networks Ch.Rajitha, student, Department of Computer Science, Vignan’s Nirula Institute of Technology & Science for Women, Guntur, AP, India, P.Radhika, Professor (Principal), Department of Computer Science, Vignan’s Nirula Institute of Technology & Science for Women, Guntur, AP, India K.V. Narasimha Reddy , Asst. Professor, Department of Computer Science, Vignan’s Nirula Institute of Technology & Science for Women, Guntur, AP, India Abstract— This paper introduces a cooperation-based database caching system for Mobile Ad Hoc Networks (MANETs). The heart of the system is the nodes that cache submitted queries. The queries are used as indices to data cached in nodes that previously requested them. We discuss how the system is formed and how requested data is found if cached, or retrieved from the external database and then cached. The system comprises Proxy Caches (PCs), for acting as the interface to remote Web services and the internally cached service responses, Request Directories (RDs) for caching the cache keys that act as indexes to the responses, and finally, the Caching Nodes (CNs) that cache the responses. This paper based on Hamlet framework allows MANET users to take caching decisions on content that they have retrieved from the network. The impact of the Zipf distribution exponent on the performance of the cache replacement strategies. We recall that an exponent that is equal to zero implies perfect homogeneity. Describes a distributed system designed for environments to cache proxies of consumed web services and responses of their invoked methods. Keywords— Privacy-preserving, data publishing, functional dependency, utility, data reconstruction. I. INTRODUCTION Web services have emerged as a popular middleware for offering Remote Method Invocation. In case of Mobile Ad hoc Networks (MANET’s) connectivity to external information source gets disrupted due to device mobility and disconnection results in empty out the battery power and device gets switched off. Therefore by using the caching strategy in the whole MANET’s allows for improvement in the network as a whole. Cached response of the web service will be useful only if the future calls use same arguments as those of response cached. In many situations same calls may be made in the case of popular web services. Caching the proxies makes the system to save the time and subsequent call to the same service doesn’t require downloading (Web Service Definition Language) WSDL file as done initially. Web services were built by XML technologies to aid IT developers to help heterogeneous applications. The architecture of prevalent web services have three main roles: service provider, service consumer and integrated registry and ISSN: 2231-5381 discover current technology Web services discovery based on UDDI are designed for such Web services that can provide the necessity of user dutiful and their necessity of user undutiful such service qualities are greatly ignored in discovery. With increasing the number of web services on web, it may be caused problems as services on web, it may be caused problems as services are returned that are useless Regardless details, web services are applications that can be published, located and invoked by network, for example: [9]. Web services are application components which are based on XML [2]. Web services can be used by any application irrespective of platform in which it is developed. Web service description is provided in WSDL document. It can be accessed from internet using SOAP protocol. In industry, many applications are built by calling different web services available on internet. These applications are highly dependent on discovering correct and efficient web service. The discovered web service must match with the input, output, preconditions and effects specified by the user. Even after functional matching, QoS parameters also need to be matched to have best web service from available web services. Web services developed by different vendors are published on internet using UDDI [1]. UDDI is the mechanism for registering and discovering web services. It is platform independent registry as it is based on extensible markup language. It allows businesses to give list of services and describe how they interact with each other. In literature, many approaches for web service discovery are described some of which work on UDDI. Search in UDDI is based on keyword matching which is not efficient as huge number of web services may match a keyword and it is difficult to find the best one. Other approaches take advantage of semantic web concept where web service matching is done using ontologies. Discovering web services automatically without human interface is an important concern. Different approaches to for automatic discovery of web services are also suggested by authors. This paper is organized as follows: section 2 gives overview of web service discovery process. Section 3 describes service discovery approaches. We conclude the paper in section 4. http://www.ijettjournal.org Page 1958 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 -Taking information of portfolio cost - Obtaining weather report - Reserving airport ticket Web services may use of other web services to perform their works [5] [9]. In simple word, it can be said that web service is a traditional web service (like nominating service, weather report service producing electronic and etc) that is available by network. Web service follows of a set of standards that is caused service-consumers who follow of them to obtain them by network. These standards make the architecture core of web component [2]. A web service is a kind of web component. This component makes application which use of it able to apply this web service methods [7]. Nowadays the security problems are the biggest preventative ways on deploying the web services. However many efforts have made in the context of the web services. Still, some of the problems haven't been solved totally. Such as, to compatible of access control in the web services.[13][15] The architecture with weak and distributed connection for the web services creates challenges in surveying on patents and applying the access control on different references. Such architecture hasn't been yet created to control the access of web services, as they are composed for a special operation. Different departments have roles with different accesses, so, the registration of specifications or clients roles is difficult between different systems [13],[17]. II. BACKGROUND WORK As format for sending web service request is fixed, some information in user’s request is lost during transforming user’s request to formalized one. To overcome this limitation, context aware web service discovery approach is suggested by Wenge Rong and Kecheng Liu [4]. Context aware discovery is useful for request optimization, result optimization and personalization. As concept of context is very complex, they suggest with an example that context should be domain oriented or problem oriented. The context in web service discovery is formally defined as any information that explicitly and implicitly affects the user’s web service request generation. They divide context in two categories as Explicit and implicit. Explicit context is directly provided by the user during matchmaking process such as Q&A information. Implicit context is collected in automatic or semi-automatic manner. Implicit context is more applicable to web service discovery as user is not directly involved. Context awareness is again divided in four categories depending on how context is collected. The categories are Personal profile oriented context, Usage history oriented context, Process oriented context and other context. Personal profile oriented context is collected using user’s personal profile which contains personal data, preferences and other information. Personalization information such as location, time and user’s situation is used for decomposing the discovery goal, setting selection criteria and supplying parameters. Limitation of this method is, it ISSN: 2231-5381 makes system architecture more complicated when new attributes and constraints are introduced. Usage history oriented context is collected for predicting user’s next behavior. It is based on assumption that web service requests by specific user are similar during a certain period of time. Usage history oriented context is again divided in two categories as Personal usage history oriented context and Group usage history oriented context. User’s previous system interaction can be stored in system log. Log records can be used to provide recommendation for service selection decision. But the user may not have similar requirements afterwards. So Group usage history oriented context is used where web service matchmaking is based on behavior information of other user groups in similar situation. One of the examples of Group oriented context awareness is collaborative filtering (CF) which may be memory based or content based. Group oriented context can also be collected from observation data in particular community. Process oriented context is built from user sessions. User reactions to retrieved web services are understood in particular request session and the discovery is optimized. This feed based process oriented context can be built using Probabilistic Latent Semantic Analysis (PLSA) [5]. In case where single web service is not sufficient to complete user request, composition of multiple web services is carried out. In this case, context should be built considering composite web service discovery process. This approach is better than traditional keyword matching used in UDDI as user intension is understood better. By considering that the network deployment affects the implementation of the context data distribution in real-world systems, this section discusses existing and emerging network deployment scenarios. Of course, the adopted network deployment can lead to different degrees of connectivity among nodes, and it could implicitly either favor or hinder the coordination and the communication among context data sources and sinks. For the sake of clarity, this section presents the main categories of possible network deployments; Section 5 compares surveyed solutions to highlight the main effects of the network deployment on the context data distribution. First of all, we consider three principal broad categories of network deployment: i) fixed, that simply extends the traditional (wired) Internet with wireless Access Points (APs); ii) ad-hoc, where mobile entities communicate directly (without infrastructure); and iii) hybrid, that combines the two previous approaches. In fixed infrastructure, the context data distribution uses some service reachable through the wireless infrastructure. III. METHODS The Hamlet framework allows wireless users to take caching decisions on content that they have retrieved from the network. The process that we devise allows users to take such decisions by leveraging a node’s local observation, i.e., the node’s ability to overhear queries and information messages on the wireless channel. In particular, for each information http://www.ijettjournal.org Page 1959 International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 5- May 2013 item, a node records the distance (in hops) of the node that issues the query, i.e., where a copy of the content is likely to be stored, and the distance of the node that provides the information. Based on such observations, the node computes an index of the information presence in its proximity for each of the I items. Then, as the node retrieves content that it requested, it uses the presence index of such an information item to determine Benchmarking Hamlet: We set the deterministic caching time in DetCache to 40 s, and we couple DetCache and Hamlet with both the mitigated flooding and Eureka techniques for query propagation. We are interested in the following two fundamental metrics: 1) the ratio of queries that were successfully solved by the system and 2) the amount of query traffic that was generated. The latter metric, in particular, provides an indication of the system effectiveness in preserving locally rich information content: if queries hit upon the sought information in one or two hops, then the query traffic is obviously low. However, whether such a wealth of information is the result of a resource-inefficient cache-all-you-see strategy or a sensible cooperative strategy. Impact of the Zipf Distribution Skewness: Finally, we study the impact of the Zipf distribution exponent on the performance of the cache replacement strategies. We recall that an exponent that is equal to zero implies perfect homogeneity, i.e., Zipf distribution that degenerates into a uniform distribution, whereas the difference in popularity among content becomes much more unbalanced as the exponent [16] grows. We focus on a network where ten items are available and each node can cache at most one complete item. [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [5] R. Costello, “Building Web Services the REST Way,” http:// www.xfront.com/REST-Web-Services.html, 2009. [6] R. Friedman, “CachingWeb Services in Mobile Ad-Hoc Networks: Opportunities and Challenges,” Proc. Second ACM Int’l Workshop Principles of Mobile Computing, pp. 90-96, 2002. [7] S. Kim and M. Rosu, “A Survey of Public Web Services,” Proc. 13th Int’l World Wide Web Conf. (WWW ’04), pp. 1044-1045, 2004. [8] S. Lim, W. Lee, G. Cao, and C. Das, “A Novel Caching Scheme for Internet Based Mobile Ad Hoc Networks,” Proc. 12th IEEE Int’l Conf. Computer Comm. Networks, Oct. 2003. [9] S. Lyer, A. Rowstron, and P. Druschel, “Squirrel: A Decentralized Peer-to-PeerWeb Cache,” Proc. ACM Symp. Principles of Distributed Computing (PODC ’02). [10] R. Malpani, J. Lorch, and D. Berger, “Making World Wide Web Caching Servers Cooperate,” World Wide Web J., vol. 1, no. 1, 1996. [11] Bertino, Elisa, Martino, Lorenzo, Paci, Federica, Squicciarini, Anna. Security for Web Services and Service-Oriented Architectures. Springer, 2009. [12] O'Neill, Mark. Web services security. McGraw-Hill Professional, 2003. [13] Galbraith , Ben. Professional web services security. Wrox, 2002. [14] Periorellis, Panos. Securing Web services: practical usage of standards and specifications. IGI Global snippet, CH.Rajitha M.Tech (CSE) Department of Computer Science & Engineering at Vignan’s Nirula Institute Of Technology & Science for Women, Guntur. IV. CONCLUSION This paper presented a novel system that enables nodes joining the network to take advantage of Web services already consumed by the network and to contribute by consuming additional services so that they would be used by other nodes. The system provides benefits to mobile devices through reducing the average wait time associated with requesting data that is supplied by Web services and by decreasing the amount of traffic in the network which will translate directly to saving battery power consumption since devices in the network also forward data packets in addition to being the sources and destinations of transmitted data. P.Radhika Professor (Principal) Department of Computer Science & Engineering at Vignan’s Nirula Institute Of Technology & Science for Women, Guntur. He guided many projects in the area of image processing for CSE & IT Departments. His research interests are in the areas of Datamining and Image Processing. REFERENCES [1] [2] [3] [4] [1] H. Artail and H. Al-Asadi, “A Cooperative and Adaptive System for Caching Web Service Responses in MANETs,” Proc. IEEE Int’l Conf. Web Services (ICWS ’06), Sept. 2006. [2] H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and Adaptive Caching System for MANETs,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug. 2008. [3] C. Bettstetter, H. Hartenstein, and X. Pe´rez-Costa, “Stochastic Properties of the Random Waypoint Mobility Model,” Wireless Networks, vol. 10, no. 5, pp. 555-567, 2004. [4] C. Chi-Hung and S. Lau, “Data Prefetching with Co-Operative Caching,” Proc. Fifth Int’l Conf. High Performance Computing, pp. 25-32, 1998. ISSN: 2231-5381 K.V.Narasimha Reddy received the B.Tech(CSE) from JNTUH, M.Tech(C.S.E) from JNTUK he is currently working as an Assistant Professor & Head of the Department of Computer Science & Engineering at Vignan’s Nirula Institute Of Technology & Science for Women, Guntur. He guided many projects in the area of image processing for CSE & IT Departments. His research interests are in the areas of Datamining and Image Processing. http://www.ijettjournal.org Page 1960