Académique Documents
Professionnel Documents
Culture Documents
Research Article
ABSTRACT
For mobile devices used in dynamic networks (that is, with frequent changes in topology due to
node failure / unavailability and mobility in a mobile cloud) largely ignored, however, remained
challenges in terms of reliability and efficiency. To the best of our knowledge, we can first have to
address these challenges in an integrated manner for both data storage and processing in mobile
cloud, an approach we call k-out-of-n-Computing. In our solution, mobile devices successfully
retrieve or process data in the most energy-efficient manner, as long as k n are accessible from
remote servers. Through a real implementation of the system, we demonstrate the feasibility of our
approach. the first frame fault tolerant and energy-efficient Remote Storage & processing under a
dynamic network topology, that is, to support mobile cloud. Our framework aims, for applications
that require an energy-efficient and reliable distributed data storage and processing in a dynamic
network. For example, military operations or civil protection. Three famous fault tolerance
strategies are initiated in the following formulas to estimate the probability of default of the fault-
tolerant modules. In this work, probability of default of a cloud component is described as the
probability that precipitates an invocation of this component. The cost of the failure probability is
in the range of [0.1]. In particular, we examine how data and processes with k-out such reliability
of-n to store the data stored in mobile cloud that: 1) minimizing the energy consumption for
distributed data collection; 2) minimizing the energy consumption of distributed data for
processing and 3) data processing and dynamic topology changes are taken into account
distributed. Scheduling techniques such as the decision set to be taken by scheduling manager, if
the assigned node cloud struck leaves two planning techniques. These techniques are: restoration
technique and fault tolerance technology.
29
T. Aswini et al, Journal of Recent Research in Engineering and Technology
30
Journal of Recent Research in Engineering and Technology T. Aswini et al,
31
T. Aswini et al, Journal of Recent Research in Engineering and Technology
32
Journal of Recent Research in Engineering and Technology T. Aswini et al,
like a hurricane, may incorporate thousands node 802.11b test show that ETX improved
of scores of jurisdictions. To manage performance significantly over the
complexity at this scale, responders often widespread minimum hop count metric. For
organize following Incident Command long distances, the increase in throughput is
System (ICS) guidelines [4]. To operate in often by a factor of two or more, suggesting
this difficult environment, WASNs must that ETX make useful are greater than
provide standard architectures and networks and paths longer. We also present a
composable, scalable networks structured to simple model for predicting how the package
conform to ICS standards. Lack of delivery ratio varies with packet size and
communications infrastructure is a third detailed measurements that characterize the
challenge faced in larger disasters. Entire test environment of the distribution of Link
regions suffer from degraded delivery conditions and route through.
communications, and remaining capacity is
exhausted by the demands of victims. Online Prediction of Battery Lifetime for
Disaster responders must arrive with their Embedded and Mobile Devices
own communications. WASNs designed for
disaster response must provide standalone, We investigate online statistical approach to
robust, and pervasive communications battery life prediction that connects observed
sufficient to support the geographic recently Dissipation \ history "with pre
coverage and mobility requirements of its calculated online benchmark measurements.
users. By dynamically integrating on-line
measurements, our approach is able to make
High-Throughput Routing for Multi-Hop predictions that take into account the
Wireless Networks "recovery effect" that the batteries experience
The expected transfer count (ETX) metric is different workloads when they are
nd a new route metric for fi high throughput discharged, and the charge cycle causes the
paths in multi-hop wireless networks. The battery power changes, batteries are
ETX of a path is the expected total number of recharged again and again. These systems try
packet transmissions (including repeats) to make accurate predictions derivative off-
required to successfully deliver a package in line available for use in design or analytical
this way. For practical networks, routes with contexts. Efficient analysis methods, such as,
the minimum ETX have the highest and consider the problems of online
throughput. The ETX metric contains the prediction, but do not include the statistical
effects of link loss ratios, asymmetry in the components needed to quickly analyze
loss ratios between the two directions of each dynamically changing workload and working
compound, and interference between the conditions.
successive links of a path. A busy network, the
ETX route metric is used to also maximize
3. PROPOSED WORK
total network throughput. We describe the
design and implementation of an ETX metric We propose the first frame fault tolerant
for DSDV and DSR routing protocols, as well and energy-efficient remote support Storage
as modifications to DSDV and DSR that it & processing under a dynamic network
works well with ETX. Measurements of a 29- topology, that is, mobile cloud. Our
framework aims, for applications that require
33
T. Aswini et al, Journal of Recent Research in Engineering and Technology
4. SYSTEM DESIGN
34
Journal of Recent Research in Engineering and Technology T. Aswini et al,
6. EXPERIMENTAL RESULTS
1
0.8
0.6
Probability
Fig 3: Fault-Tolerence technique 0.4
0.2
5.3 Recovery Block (RB).
Failure
Recovery block is a known mechanism in
0
software fault tolerance used. It called 0.20% 0.40% 0.60% 0.80% 1%
System
structuring redundant modules are available,
in which stand-in components to appeal to Fig 4: Component Failure
succession when the primary component is Probability
not happening. A recovery block fails just
when all redundant mechanism fails: Existing System
∏ 1)
Proposed System
The failure probability f a recovery block can
be considered where n is the number of Impact of component failure
redundant mechanism and fi is the probability
probability of failure of the sixth part.
35
T. Aswini et al, Journal of Recent Research in Engineering and Technology
36
Journal of Recent Research in Engineering and Technology T. Aswini et al,
[3] S. Kosta, A. Aucinas, P. Hui, R. Mortier, and [12] D. Leong, A. G. Dimakis, and T. Ho,
X. Zhang, “ThinkAir: Dynamic resource “Distributed storage allocation for high
allocation and parallel execution in the cloud reliability,” in Proc. IEEE Int. Conf. Commun.,
for mobile code offloading,” in Proc. IEEE 2010, pp. 1–6.
Conf. Comput. Commun., 2012, pp. 945–953. [13] M. Aguilera, R. Janakiraman, and L. Xu,
[4] C. Shi, V. Lakafosis, M. H. Ammar, and E. W. “Using erasure codes efficiently for storage in
Zegura, “Serendipity: Enabling remote a distributed system,” in Proc. Int. Conf.
computing among intermittently connected Dependable Syst. Netw., 2005, pp. 336–345.
mobile devices,” in Proc. 13th ACM Int. Symp. [14] M. Alicherry and T. Lakshman, “Network
Mobile Ad Hoc Netw. Comput., 2012, pp. 145– aware resource allocation in distributed
154. clouds,” in Proc. IEEE Conf. Comput.
[5] S. M. George, W. Zhou, H. Chenji, M. Won, Commun., 2012, pp. 963–971.
Y. Lee, A. Pazarloglou,R. Stoleru, and P. [15] A. Beloglazov, J. Abawajy, and R. Buyya,
Barooah, “DistressNet: A wireless Ad Hoc and “Energy-aware resource allocation heuristics
sensor network architecture for situation for efficient management of data centers for
management in disaster response,” IEEE cloud computing,” Future Generation Comput.
Commun. Mag., vol. 48, no. 3, pp. 128–136, Syst., vol. 28, no. 5, pp. 755–768, 2012.
Mar.2010. 16] C. Liu, X. Qin, S. Kulkarni, C. Wang, S. Li, A.
[6] D. W. Coit and J. Liu, “System reliability Manzanares, and S. Baskiyar, “Distributed
optimization with k-outof-n subsystems,” Int. energy-efficient scheduling for data-intensive
J. Rel., Quality Safety Eng., vol. 7, no. 2, pp. applications with deadline constraints on
129–142, 2000. data grids,” in Proc. IEEE Int. Perform.,
[7] D. S. J. D. Couto, “High-throughput routing Comput. Commun. Conf., 2008, pp. 26–33.
for multi-hop wireless networks,” Ph.D. [17] D. Shires, B. Henz, S. Park, and J. Clarke,
dissertation, Dept. Elect. Eng. Comput. Sci., “Cloudlet seeding: Spatial deployment for
MIT, Cambridge, MA, USA, 2004. high performance tactical clouds,” in Proc.
[8] Y. Wen, R. Wolski, and C. Krintz, “Online World Congr. Comput. Sci., Comput. Eng.,
prediction of battery lifetime for embedded Applied Comput., 2012, pp. 1–7.
and mobile devices,” in Proc. 3rd Int. Conf. [18] D. Neumann, C. Bodenstein, O. F. Rana,
Power-Aware Comput. Syst., 2005, pp. 57–72. and R. Krishnaswamy, “STACEE: Enhancing
[9] A. Leon-Garcia, Probability, Statistics, and storage clouds using edge devices,” in Proc.
Random Processes for Electrical Engineering. 1st ACM/IEEE Workshop Autonomic Comput.
Englewood Cliffs, NJ, USA: Prentice Hall, 2008. Economics, 2011, pp. 19–26.
[10] S. Huchton, G. Xie, and R. Beverly, [19] D. Huang, X. Zhang, M. Kang, and J. Luo,
“Building and evaluating a kresilient mobile “MobiCloud: Building secure cloud
distributed file system resistant to device framework for mobile computing and
compromise,” in Proc. Mil. Commun. Conf., communication,” in Proc. IEEE 5th Int. Symp.
2011, pp. 1315–1320. Serv. Oriented Syst. Eng., 2010, pp. 27–34.
[11] A. G. Dimakis, K. Ramchandran, Y. Wu, [20] P. Stuedi, I. Mohomed, and D. Terry,
and C. Su, “A survey on network codes for “WhereStore: Location based data storage for
distributed storage,” Proc. IEEE, vol. 99, no. 3, mobile devices interacting with the cloud,” in
pp. 476–489, Mar. 2011. Proc. 1st ACM Workshop Mobile Cloud
37
T. Aswini et al, Journal of Recent Research in Engineering and Technology
38