SlideShare une entreprise Scribd logo
1  sur  7
Network-Assisted Mobile Computing with Optimal Uplink
Query Processing
ABSTRACT:
Many mobile applications retrieve content from remote servers via user generated
queries. Processing these queries is often needed before the desired content can be
identified. Processing the request on the mobile devices can quickly sap the limited
battery resources. Conversely, processing user queries at remote servers can have
slow response times due communication latency incurred during transmission of
the potentially large query. We evaluate a network-assisted mobile computing
scenario where mid-network nodes with “leasing” capabilities are deployed by a
service provider. Leasing computation power can reduce battery usage on the
mobile devices and improve response times. However, borrowing processing
power from mid-network nodes comes at a leasing cost which must be accounted
for when making the decision of where processing should occur. We study the
tradeoff between battery usage, processing and transmission latency, and mid-
network leasing. We use the dynamic programming framework to solve for the
optimal processing policies that suggest the amount of processing to be done at
each mid-network node in order to minimize the processing and communication
latency and processing costs. Through numerical studies, we examine the
properties of the optimal processing policy and the core tradeoffs in such systems
EXISTING SYSTEM:
In the previous section we identified special properties of the optimal processing
policy under various scenarios. We now examine some of these properties through
numerical studies with example cost functions and systems. Latency, battery usage,
and leasing costs have a tightly woven relationship.
DISADVANTAGES OF EXISTING SYSTEM:
1) Increasing battery usage will decrease latency and leasing costs, but also limits
the lifetime of the mobile device
2) Conversely, the lifetime of the device can be extended by increasing leasing
costs which will decrease latency and battery usage.
PROPOSED SYSTEM:
A user request originates at the Mobile Station (MS). In order to be
completed, the request must be transmitted upstream to a remote Application
Server (AS) via a Base Station (BS) and a series of relay nodes. We refer to the
node at the first hop as the base station, but emphasize that the links between the
BS, relay nodes, and AS may be wired or wireless. Similarly running a text to
speech conversion application for usage scenarios.
ADVANTAGES OF PROPOSED SYSTEM:
1) If the request processing is entirely done at the MS, the limited battery power
can be drained.
2) If the processing is done at the AS, communication latency can be high due to
limited bandwidth of the wireless access link and large query size.
MODULES:
1. Leasing Model
2. Relaying Strategies
3. Multi-hop Transmission
MODULES DESCRIPTION:
Leasing Model:
Utilizing the processing power of intermediary nodes is the main idea behind
Network-Assisted Mobile Computing. Leasing processing power from mid-
network nodes can be extremely beneficial to reduce latency and to extend the
battery life of a mobile device. However, it comes with a cost. These costs can
capture the fee required to lease CPU power from the mid-network nodes.
Additionally, these costs may capture potential security risks by giving access of
client data to these nodes. Some operations, such as transcoding, can be done on
Encrypted data, while other would require decrypting the data. The mobile station
send one sentence for ex: (how are you), in the application server receive the
sentence into audio.
Relaying Strategies:
• Amplify-and-forward
• Decode-and-forward
In amplify-and-forward, the relay nodes simply boost the energy of the signal
received from the sender and retransmit it to the receiver. In decode-and-forward,
the relay nodes will perform physical-layer decoding and then forward the
decoding result to the destinations. If multiple nodes are available for cooperation,
their antennas can employ a space-time code in transmitting the relay signals. It is
shown that cooperation at the physical layer can achieve full levels of diversity
similar to a system, and hence can reduce the interference and increase the
connectivity of wireless networks.
Multi-hop Transmission:
Multi-hop transmission can be illustrated using two-hop transmission. When two-
hop transmission is used, two time slots are consumed. In the first slot, messages
are transmitted from the mobile station to the relay, and the messages will be
forwarded to the Application Server in the second slot. The outage capacity of this
two-hop transmission can be derived considering the outage of each hop
transmission.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
SOFTWARE REQUIREMENTS:
Operating system : Windows XP Professional.
Coding Language : C#.NET
ARCHITECTURE:
REFERENCE:
Carri W. Chan,Member, IEEE, Nicholas Bambos, Member, IEEE, and Jatinder Pal
Singh,Member, IEEE “Network-Assisted Mobile Computing with Optimal Uplink
Query Processing”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 6, JUNE 2013.

Contenu connexe

Tendances

Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
CSCJournals
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
Vennila Raja
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
rajivagarwal23dei
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
Habibur Rahman
 

Tendances (14)

Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
 
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
 
On the performance of energy harvesting AF partial relay selection with TAS a...
On the performance of energy harvesting AF partial relay selection with TAS a...On the performance of energy harvesting AF partial relay selection with TAS a...
On the performance of energy harvesting AF partial relay selection with TAS a...
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
Unit 4
Unit 4Unit 4
Unit 4
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
Power allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning inPower allocation for statistical qo s provisioning in
Power allocation for statistical qo s provisioning in
 
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
 
Directed diffusion for wireless sensor networking
Directed diffusion for wireless sensor networkingDirected diffusion for wireless sensor networking
Directed diffusion for wireless sensor networking
 

En vedette

En vedette (19)

Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
 
Identity based secure distributed data storage schemes
Identity based secure distributed data storage schemesIdentity based secure distributed data storage schemes
Identity based secure distributed data storage schemes
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
 
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...Proteus multiflow diversity routing for wireless networks with cooperative tr...
Proteus multiflow diversity routing for wireless networks with cooperative tr...
 
Towards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud dataTowards secure multi keyword top-k retrieval over encrypted cloud data
Towards secure multi keyword top-k retrieval over encrypted cloud data
 
A rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacksA rank correlation based detection against distributed reflection do s attacks
A rank correlation based detection against distributed reflection do s attacks
 
Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...Using fuzzy logic control to provide intelligent traffic management service f...
Using fuzzy logic control to provide intelligent traffic management service f...
 
Facilitating document annotation using content and querying value
Facilitating document annotation using content and querying valueFacilitating document annotation using content and querying value
Facilitating document annotation using content and querying value
 
2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech2013 14 ieee ece project titles - jp infotech
2013 14 ieee ece project titles - jp infotech
 
Distributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networksDistributed cooperative caching in social wireless networks
Distributed cooperative caching in social wireless networks
 
2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca2013 ieee java project titles for cse, it and mca
2013 ieee java project titles for cse, it and mca
 
A highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networksA highly scalable key pre distribution scheme for wireless sensor networks
A highly scalable key pre distribution scheme for wireless sensor networks
 
Privacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public cloudsPrivacy preserving delegated access control in public clouds
Privacy preserving delegated access control in public clouds
 
IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014IEEE PROJECTS FOR ECE 2013 2014
IEEE PROJECTS FOR ECE 2013 2014
 
final year ieee projects in pondicherry
final year ieee projects in pondicherryfinal year ieee projects in pondicherry
final year ieee projects in pondicherry
 
Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
 
Efficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networksEfficient algorithms for neighbor discovery in wireless networks
Efficient algorithms for neighbor discovery in wireless networks
 
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...Toward fine grained, unsupervised, scalable performance diagnosis for product...
Toward fine grained, unsupervised, scalable performance diagnosis for product...
 
Secure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databasesSecure mining of association rules in horizontally distributed databases
Secure mining of association rules in horizontally distributed databases
 

Similaire à Network assisted mobile computing with optimal uplink query processing

Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
Iaetsd Iaetsd
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
1crore projects
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
M H
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka Korale
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
Farhad Gholami
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
Iaetsd Iaetsd
 

Similaire à Network assisted mobile computing with optimal uplink query processing (20)

Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
Iaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by usingIaetsd increasing network life span of manet by using
Iaetsd increasing network life span of manet by using
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
 
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORKDYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedinAsoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing SystemsEffective Replicated Server Allocation Algorithms in Mobile computing Systems
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
 
Et24912915
Et24912915Et24912915
Et24912915
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 

Dernier

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 

Network assisted mobile computing with optimal uplink query processing

  • 1. Network-Assisted Mobile Computing with Optimal Uplink Query Processing ABSTRACT: Many mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user queries at remote servers can have slow response times due communication latency incurred during transmission of the potentially large query. We evaluate a network-assisted mobile computing scenario where mid-network nodes with “leasing” capabilities are deployed by a service provider. Leasing computation power can reduce battery usage on the mobile devices and improve response times. However, borrowing processing power from mid-network nodes comes at a leasing cost which must be accounted for when making the decision of where processing should occur. We study the tradeoff between battery usage, processing and transmission latency, and mid- network leasing. We use the dynamic programming framework to solve for the optimal processing policies that suggest the amount of processing to be done at each mid-network node in order to minimize the processing and communication
  • 2. latency and processing costs. Through numerical studies, we examine the properties of the optimal processing policy and the core tradeoffs in such systems EXISTING SYSTEM: In the previous section we identified special properties of the optimal processing policy under various scenarios. We now examine some of these properties through numerical studies with example cost functions and systems. Latency, battery usage, and leasing costs have a tightly woven relationship. DISADVANTAGES OF EXISTING SYSTEM: 1) Increasing battery usage will decrease latency and leasing costs, but also limits the lifetime of the mobile device 2) Conversely, the lifetime of the device can be extended by increasing leasing costs which will decrease latency and battery usage. PROPOSED SYSTEM: A user request originates at the Mobile Station (MS). In order to be completed, the request must be transmitted upstream to a remote Application Server (AS) via a Base Station (BS) and a series of relay nodes. We refer to the node at the first hop as the base station, but emphasize that the links between the
  • 3. BS, relay nodes, and AS may be wired or wireless. Similarly running a text to speech conversion application for usage scenarios. ADVANTAGES OF PROPOSED SYSTEM: 1) If the request processing is entirely done at the MS, the limited battery power can be drained. 2) If the processing is done at the AS, communication latency can be high due to limited bandwidth of the wireless access link and large query size. MODULES: 1. Leasing Model 2. Relaying Strategies 3. Multi-hop Transmission
  • 4. MODULES DESCRIPTION: Leasing Model: Utilizing the processing power of intermediary nodes is the main idea behind Network-Assisted Mobile Computing. Leasing processing power from mid- network nodes can be extremely beneficial to reduce latency and to extend the battery life of a mobile device. However, it comes with a cost. These costs can capture the fee required to lease CPU power from the mid-network nodes. Additionally, these costs may capture potential security risks by giving access of client data to these nodes. Some operations, such as transcoding, can be done on Encrypted data, while other would require decrypting the data. The mobile station send one sentence for ex: (how are you), in the application server receive the sentence into audio. Relaying Strategies: • Amplify-and-forward • Decode-and-forward In amplify-and-forward, the relay nodes simply boost the energy of the signal received from the sender and retransmit it to the receiver. In decode-and-forward,
  • 5. the relay nodes will perform physical-layer decoding and then forward the decoding result to the destinations. If multiple nodes are available for cooperation, their antennas can employ a space-time code in transmitting the relay signals. It is shown that cooperation at the physical layer can achieve full levels of diversity similar to a system, and hence can reduce the interference and increase the connectivity of wireless networks. Multi-hop Transmission: Multi-hop transmission can be illustrated using two-hop transmission. When two- hop transmission is used, two time slots are consumed. In the first slot, messages are transmitted from the mobile station to the relay, and the messages will be forwarded to the Application Server in the second slot. The outage capacity of this two-hop transmission can be derived considering the outage of each hop transmission. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB.
  • 6. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 512 MB. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional. Coding Language : C#.NET ARCHITECTURE:
  • 7. REFERENCE: Carri W. Chan,Member, IEEE, Nicholas Bambos, Member, IEEE, and Jatinder Pal Singh,Member, IEEE “Network-Assisted Mobile Computing with Optimal Uplink Query Processing”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 6, JUNE 2013.