36
CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN WIRELESS AD-HOC NETWORKS Presented by, G.Bhaskar(08S11A1203 N.V.Mahesh(08S11A125 ) A.Devisree(08S11A121 ) Under the guidance of, J.Santhosh Kumar Goud

Final Review 1203

Embed Size (px)

Citation preview

Page 1: Final Review 1203

CACHING STRATEGIES BASED ON INFORMATION DENSITY ESTIMATION IN WIRELESS AD-HOC NETWORKS

Presented by,G.Bhaskar(08S11A1203)N.V.Mahesh(08S11A1259)A.Devisree(08S11A1211)Under the guidance of,

J.Santhosh Kumar Goud

Page 2: Final Review 1203

Abstract•We address cooperative caching in wireless

networks, where the nodes may be mobile and exchange information in a peer-to-peer fashion.

•We devise two different strategies for both large and small sized caches, where the result is creation of content diversity within the nodes neighbourhood, so that a requesting user likely finds the desired information, thus leading to a resource-efficient information access.

Page 3: Final Review 1203

Introduction to project•By title itself our project explains about

caching mechanisms based on information flow in wireless networks & deals with problems like congestion control

•Our project is based on two strategies 1)Router2) virtual machine

Page 4: Final Review 1203

Objective•Data caching strategy for ad hoc networks.

•Content diversity within the nodes.

•User gets the desired information.

•Caches Compares with each other.

Page 5: Final Review 1203

•A cache is a place to store something temporarily

•Caching helps in reducing communication, this results in savings in bandwidth, as well as battery energy.

•Two types of caches exists:

Large sized and small sized caches

Page 6: Final Review 1203

Ad hoc networks

it can self organize into a network without the help of an existing infrastructure.

Page 7: Final Review 1203

Existing system•Manet uses Flooding type Routing protocols

like hash based or router based which faces several disadvantages.

•Network Bandwidth is wasted.•Messages can also become duplicated ie.,no

content diversity.• Selective flooding partially addresses these

issues by only sending packets to routers in the same direction.

Page 8: Final Review 1203

Proposed system•Caching scheme here will succeed in content

diversity.•The solution that was proposed is based on the

formation of an overlay network composed of “mediator” nodes.

•Eliminates unnecessary flooding,by cooperative caching.

•A route is established only when it is required.

Page 9: Final Review 1203

Advantage•Reduces the access latency and

bandwidth usage.

•Requires the manual setting of a network wide “Caching zone”,which is challenging task,but very efficient.

Page 10: Final Review 1203

IMPLEMENTATION

Page 11: Final Review 1203

Hardware & software Requirements • HARDWARE REQUIREMENTS: Processor : Pentium IV 2.8GHz. RAM : 512 MB RAM. Hard Disk : 40 GB. Input device : Standard Keyboard and Mouse. Output device : VGA and High Resolution

Monitor. • SOFTWARE REQUIREMENTS: Operating System : Windows XP Language : JDK 1.6. 

Page 12: Final Review 1203

SDLC life cycleSpiral model

Page 13: Final Review 1203

Architecture

Page 14: Final Review 1203

UML diagrams

Network

+sender()

AddNodes

+nodeinCreation()+nodeInCell()

CachingPath

+adjacentNodes()+totalNodes()+getShortest()+getCachingNodes()+pathDifference()

DataCaching

+startMobility()+refreshNodes()

Class diagram

Page 15: Final Review 1203

Use case diagramJ oin

Send heart beat signals

Host

Recieve signals

GetAddress

Disconnect from Network

Receive

Resolve Adrresing

Routing

Organizing

remove

Network

Page 16: Final Review 1203

Sequence diagramNew Node Network Parent

1 : enter thw network()2 : find the parent()

3 : return the parent node position()

4 : attach as child node()

5 : Reorganizw the network()

6 : calculate the new address()

7 : update routing tables()

8 : return adress and rouitng table()

Page 17: Final Review 1203

Collaboration diagram

2:Find the parent

5.Reorganize the network

7.Updating routing table

8.Return address and routing table

6.Calculate the new address

3.Return the parent node position

4.Attach as child node

1.Enter the network

New Node Network

Parent

Page 18: Final Review 1203

Activity diagramwait for new nodes

if node enters

Composite position

Reorganize Tree

Calculate new Adrress

Update Routiing Tables

Page 19: Final Review 1203

Testing

• WHITE BOX TESTING

•BLACK BOX TESTING • PROGRAM TESTING

•VERIFICATION TESTING

Page 20: Final Review 1203

Literature survey

•Cooperative Caching

•Content diversity

•Caching with limited storage capabilty

•Data replication

Page 21: Final Review 1203

Data Flow Diagram: Level-0

Manet

Network

New node

Join Request

Address

Page 22: Final Review 1203

Data Flow Diagram: Level-1New node

Reorganizer

Addressresolver

RoutingSystem

Join request

Address &

Routing table

Network paths

cache

Network TreeUn addressed Tree

Routing Cachenodes

nodes

Addresses

Page 23: Final Review 1203
Page 24: Final Review 1203

HOSTS CREATION

Page 25: Final Review 1203
Page 26: Final Review 1203
Page 27: Final Review 1203
Page 28: Final Review 1203
Page 29: Final Review 1203
Page 30: Final Review 1203
Page 31: Final Review 1203
Page 32: Final Review 1203
Page 33: Final Review 1203
Page 34: Final Review 1203

Conclusion• In particular, we have considered memory capacity constraint

of the network nodes. • Efficient data caching algorithms where developed to

determine near optimal cache placements to maximize reduction in overall access cost.

• Content diversity within the nodes neighborhood so that a requesting user likely finds the desired information nearby.

Page 35: Final Review 1203

•User nodes can overhear queries for content and relative responses within their radio proximity by exploiting the broadcast nature of the wireless medium.

•User nodes can estimate their distance in hops from the query source and the responding node due to a hop-count field in the messages

Future enhancement

Page 36: Final Review 1203