A Novel and Optimal Cooperative Communication in MANET Jampana Venkata Sudheer Varma

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 1 – Oct 2014
A Novel and Optimal Cooperative Communication
in MANET
Jampana Venkata Sudheer Varma1,N. Tulasi Raju2
1
1,2
Final Mtech student,2Assistant Professor
Dept of CSE, Swarnandhra College of Engg & Tech, Seetharampuram, W.G.Dt, (A.P),India.
Abstract: Cooperative communication is the one of the current
interesting research issue in the field of wireless sensors, various
cache based approaches proposed by various authors but cache
individually cannot increase the performance over MANET.
Topology architectures defined for data transmission and
cooperative communication in MANET, In this approach we are
introducing an empirical model for cooperative communication
with one of the evolutionary algorithm along with cache
implementation which is proposed in previous mechanism, In this
approach we consider the factors of signal strength and channel
capacity for calculating the communication cost then we
generates the chromosomes for data transmission between source
and destination through intermediate nodes.
I. INTRODUCTION
In cooperative increases the efficiency of the
networking system by communicating the clients and
allows the clients requests by satisfying the cache. There
are two technologies which consider cooperative caching.
First one is performance increasing much more frequently
than the disk performance. The makes reducing the disk
access by the file system. And the second system is
making of high speed switching communication networks
can supply blocks over the network and more efficient
standard[1][2].
In previous systems there is three level storage
phases are there and which is the limited form of
cooperative caching by finding the location by sharing the
memory to substitute the other two storage levels. Initial
cooperative caching provide efficient performance and also
it improves the central hit rate and then it avoids the
systems memory access. Cooperative caching introduces
another cache system such as systems cache hierarchy.
Based on cooperative caching there is a novel level and that
may be found in local memory and the server memory. The
entire study of the cooperative caching summarizes to
provide perfect benefits over the communicative networks
and evaluate the caching and workloads of nodes.
ISSN: 2231-5381
For the data with varying the level of popularity a
greedy approach for each node that would store as unique
data as its storage allows. This method adds to
noncooperation and can increase heavy network-wide data
duplications. In the other case it is fully cooperative and a
terminal try to make the best of the total of single contents
stored within the SWNET by avoiding duplication[3].
Based on a flexibility service and pricing a
stochastic method for the content service provider cost
calculation is developed. A cooperative caching approach
that is Split Cache proposed in previous researches and it is
numerically analyzed and also theoretically proven to
provide best available object placement for systems with
similar content demands. A benefit based schema
Distributed Benefit proposed to reduce the provisioning
cost in different networks which includes the nodes with
different content request rates and patterns[4][5].
To analyze and understand the modern object
placement under similar object request model researchers
introduced the following Split Cache policy in which the
available cache space in each device is classified into a
duplicate part and a unique segment. In the first part the
nodes can store the very famous objects without bothering
about the object duplication and in the second part is
distinct objects which are allowed to be stored. The Split
Cache replacement method the immediately following an
object is retrieving from the cloud service servers and it is
divided as single type object as there is single copy of this
object in the network. Moreover at the time of downloads
by node an object and as a replica object as there are
present at least two duplicates of their SWNET node and
that object is classified of that object in the network[6].
For storing the information a novel object which is
least object in the entire cache is selected as a candidate
and it is replaced with new object if it is low popular than
the new received object. The evictee candidate is selected
for duplicate object it is only from the first duplicate
segment of the cache. A distinct object is never
http://www.ijettjournal.org
Page 9
International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 1 – Oct 2014
dispossessed in order to keep a duplicated object. Split
Cache object replacement method analyzes the modern
strategy. By using this method at static state of all devices
the cache preserves the similar objects and set in their
duplicate locations but distinct objects in their unique
areas[7].
upon on client piece of work. The N-Chance method
manipulates the Greedy Forwarding algorithm to consists
of clients cooperate to preferably cache singlets and the
data blocks stored in one client cache. Except for the
singlets the N-Chance Forwarding performance as Greedy
Forwarding operation can be done.
II. RELATED WORK
N-Chance forwarding tries to prevent ignore
singlets from client memory. At the time of client discards
a block the method checks to verify that if the block is the
final copy cached by any client node. This verifies a
message to server or may do by consulting the flags related
with every block as explained below. If the block is a
singlet and it throws the block away then the client links
the block’s recirculation number of times to n and it sends
the data to peer and it sends the server a message by
explaining it that the block has moved to
somewhere[11][12].
There so many algorithms for cooperative caching
and some of them is direct client caching, greedy caching,
central coordinated caching. Coming client caching it
allows an activated client to use a static storage. The client
gathers the entries of the local cache directly to a static
device. The client can access the remote cache as private
and its requests the remote device to become active and
leaves the cooperative caching. Its requests become simple
and it can implement without server manipulation.
Consider the server it uses the remote storage available to
have temporarily increasing the local cache. In this method
the drawback is server coordination with active clients and
do not have any advantages from the data of the active
clients storage memories.
Greedy forwarding method considers cache as
global memory which is accessed by the authenticated
clients. In every client it maintains a local cache memory
without concerning the data of other cache in the system. If
any client does not find any block in its cache then it
requests for the server data. If server does not contain the
requested data it requests another cache in the
communication network. Using this greedy caching we can
change only the file system[8][9].
Central coordinated caching includes coordinating
with the greedy forwarding. It behaves like moving
memory physically from the clients to the server. The
server maintains the central managing the client cache
using the replace of the existing algorithms. At the time of
evicting the block and it sends the block to replace the
recently utilized block over all of the clocks centrally
coordinated distributed cache. The main advantage of this
is more central hit rate and it achieves maintaining the
group of its memory. The main disadvantage of is that the
clients hit rates may reduce when their local caches are
effectively made low and global coordination may produce
the load on the server.
The last method that we can evaluate the NChance Forwarding it dynamically sets the fraction of
every client’s cache maintained cooperatively and depends
ISSN: 2231-5381
The node that receives the data links the block to
its LRU list and if the block had recently. If a recirculating
block reaches the end of the LRU list and its count is
decremented. It forwarded again the count is set to zero and
in case it is simply ignored. If a client checks a singlet it
resets the block’s recirculation count and gathers data
generally while the client had been cooperatively caching
the singlet ignores the block from its cache system[10].
Coming to privacy of content after publishing is
the main task when data transferring from source node to
destination node. In centralized server also the data privacy
is the main task. For this some traditional researches
introduced cryptographic techniques. By these techniques
the data convert into un-formatted text and more privacy
options are available for source node and the destination
node also. In centralized server also we will secure the
content by these cryptographic techniques.
In next section we introduced a new architecture
which gives moderate solution for cooperative caching and
it improves the processing efficiency while transferring and
receiving the data in the secure communication channel.
We used genetic algorithm for finding the optimal
solutions.
III. PROPOSED WORK
In our work we propose a topology, we presented as special
algorithm for moderate cooperative communication
between the nodes having parameters network channel
capability, strength of signal and temporary memory that is
http://www.ijettjournal.org
Page 10
International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 1 – Oct 2014
cache implementation for previous accessed / transferred
data for accessing. It tends to the increasing of
communication cost; hence we introduced genetic
algorithm leads to the optimal solution for decreasing the
communication cost. It applies the method for path
selection and mutation operation between the nodes. Then
mutation
operation
once again computes the
communication cost between the source node and the
destination node followed by relay nodes.
Node 2
In the initialize the communication between the
nodes we connect through socket programming. The node
which is connected with another node communication each
other at the time of data packet transfer. Each node in the
communication acts as a server and accept requests from
another nodes. It receives data packets from accepted nodes
and vice versa.
Node 3
Node 6
Node 1
Node 5
Node 4
Fig1: Node Construction
Proposed Approach:
Genetic algorithm is a process which uses the operators to
generate off spring of the previous group of chromosomes.
Here we explained about the operators present in genetic
algorithm such as Selection, Crossover and Mutation.
Selection: This operator selects a chromosome in existing
set of chromosomes based on fitness. It copies that selected
chromosome without any changes into the new
chromosomes. It uses wheel selection that depends on
fitness value of the chromosomes in each generation and
the best fittest chromosomes more chances to get selected.
Crossover: This operator generates new chromosomes
based on particular probability from two selected
chromosomes. It swaps segments in chromosomes at
particular position in chromosomes produces new
chromosome.
3. Compute path Response
Source node
Destination
node
Centralized server
4. Forward
Request
1.Request
9. Response
2. Request
5. Data Packets
nse
7. Forward
Data Packets
8. Same Request
Cache
6. Data Packets
Intermediate
Node
Fig2: Proposed Architecture
ISSN: 2231-5381
http://www.ijettjournal.org
Page 11
International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 1 – Oct 2014
Mutation: This operator generates new chromosomes by
interchanging the genes in chromosomes itself.
Our Architecture:
The below architecture show our complete
proposed work. The Source node sends request to the
global (centralized) server using cache. If the data is not
present in cache the centralized server calculates the
optimal path by calculating the optimal cost and sends the
data packets using the path in secure channel. If the
requested data packet is available at cache there is no need
to connect with centralized server otherwise it connects
with server and copy data packet from the centralized
server and then copy to cache.
Analysis of Optimal Communication cost:
IV. CONCLUSION
At cooperative communication between the nodes
are communicate each other with optimal path which is
generated by genetic algorithm. At the time of data transfer
to receiver the source node calculates communication cost
and optimal path using genetic algorithm (evolutionary
algorithm). Then the source node selects one of the paths
from the set of optimal paths to transfer the data to
destination node.
Finally we conclude our research work with efficient
cache implementation and evolutionary routing protocol
based on signal strength and channel capacity for
calculation of communication cost. Our primary factors
give optimal performance than the traditional weight based
approaches an cache improves the performance by
reducing the response time of the requested node.
Communication cost (complexity) =Signal – strength +
channel capability gets the optimal path which has the best
communication cost and transfer the data packet through
the path.
1. Source node chooses the destination to transfer
the data.
2. If the request received by the processing
method it generates the paths in architecture.
3. The Processing method calculates the path with
their signal strength and channel capability.
4. Then compute the communication complexity
with signal strength and network channel capacity for
fitness value.
5. Select optimal communication cost and transfers the
data.
Here we explain an example, Take some set of
nodes A,B,C,D,E,F and if a node ’A’ wants to send the
data to receiver ’F’ , The processing module calculates all
the available paths from source to destination. Then apply
the fitness value and obtains the optimal path and transfer
the data over that path using the following Evolutionary
approach as shown below
V. FUTURE ENHANCEMENT
ABCDEF
REFERENCES
[1] Distributed Cooperative Caching in Social Wireless Networks .
Mahmoud Taghizadeh, Kristopher Micinski, Charles Ofria, Eric Torng,
and SubirBiswas
[2] IMPROVING ON-DEMAND DATA ACCESS EFFICIENCY IN
MANETS WITH COOPERATIVE CACHING by Yu Du[3] A Survey of
Web Cache Replacement Strategies STEFAN PODLIPNIG AND
LASZLO BO¨ SZO¨ RMENYI
[4] A. Chankhunthod and P. B. Danzig and C. Neerdaels and M. F.
Schwartz and K.J. Worrell, \A hierarchical internet object cache," in
USENIX Annual Technical Conference, 1996.98
[5] L. Fan and P. Cao and J. Almeida and A. Z. Broder, \Summary cache:
a scalable wide-area web cache sharing protocol," IEEE/ACM
Transactions on Networking, vol. 8, no. 3, pp. 281{293, 2000.
ABEDCF
AEDCBF
[6] S. Iyer and A. Rowstron and P. Druschel, \Squirrel: A decentralized
peer-to-peer web cache," in PODC, 2002.
ACDBEF
Then compute the fitness value based on the
signal strength and channel capacity as communication cost
and Obtains the optimal path which has the best
communication cost and transmits the data over the path.
ISSN: 2231-5381
We are concluding our research work with efficient routing
approach for cooperative communication and cache
implementation for frequently accessed information. It
leads to optimal of usage of bandwidth, reduces the
network traffic and improves in terms of time complexity.
We can enhance our approach by reducing the time
complexity issues in the split cache replacement and by
implementing in our current approach.
[7] S. Podlipnig and L. Boszormenyi, “A Survey of Web Cache
Replacement Strategies,” ACM Computing Surveys, vol. 35, pp. 374-398,
2003.
[8] A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J.
Scott,“Impact of Human Mobility on Opportunistic Forwarding
http://www.ijettjournal.org
Page 12
International Journal of Engineering Trends and Technology (IJETT) – Volume 16 Number 1 – Oct 2014
Algorithms,” IEEE Trans. Mobile Computing, vol. 6, no. 6,pp. 606-620,
June 2007.
[9] “BU-Web-Client - Six Months of Web Client Traces,”
http://www.cs.bu.edu/techreports/1999-011-usertrace-98.gz, 2012.
[10] A. Wolman, M. Voelker, A. Karlin, and H. Levy, “On the Scale and
Performance of Cooperative Web Caching,” Proc. 17th ACM Symp.
Operating Systems Principles, pp. 16-31, 1999.
[11] S. Dykes and K. Robbins, “A Viability Analysis of Cooperative
Proxy Caching,” Proc. IEEE INFOCOM, 2001.
[12] M. Korupolu and M. Dahlin, “Coordinated Placement and
Replacement for Large-Scale Distributed Caches,” IEEE Trans.
Knowledge and Data Eng., vol. 14, no. 6, pp. 1317-1329, Nov. 2002.
BIOGRAPHIES
Venkata Sudheer Varma received the
degree in Information Technology from
Jawaharlal Nehru Technological university
Kakinada, pursuing M.Tech (computer
science and engineering). He is an p.g
student, department of computer science
and engineering, Swarnandhra Collage of Engineering &
Technology, Seetharampuram, Narsapur, AP, India. His
research areas of interests are Computer Networks.
Tulasi Raju Nethala received the master’s
degree in computer science and
engineering from jntu kakinada. He is an
Asst. professor in the department of
computer science in Swarnandhra College
of Engineering & Technology. His
research areas of interests are in Computer Networks.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 13
Download