SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
NETWORK ASSISTED MOBILE COMPUTING WITH
OPTIMAL UPLINK QUERY PROCESSING
ABSTRACT:
Many mobile applications retrieve content from remote servers via user generated
queries. Processing these queries is often needed before the desired content can be identified.
Processing the request on the mobile devices can quickly sap the limited battery resources.
Conversely, processing user-queries at remote servers can have slow response times due
communication latency incurred during transmission of the potentially large query. We evaluate
a network-assisted mobile computing scenario where midnetwork nodes with “leasing”
capabilities are deployed by a service provider. Leasing computation power can reduce battery
usage on the mobile devices and improve response times. However, borrowing processing power
from mid-network nodes comes at a leasing cost which must be accounted for when making the
decision of where processing should occur. We study the tradeoff between battery usage,
processing and transmission latency, and mid-network leasing. We use the dynamic
programming framework to solve for the optimal processing policies that suggest the amount of
processing to be done at each mid-network node in order to minimize the processing and
communication latency and processing costs. Through numerical studies, we examine the
properties of the optimal processing policy and the core tradeoffs in such systems.
ARCHITECTURE:
EXISTING SYSTEM:
In the previous section we identified special properties of the optimal
processing policy under various scenarios. We now examine some of these properties through
numerical studies with example cost functions and systems. Latency, battery usage, and leasing
costs have a tightly woven relationship.
DISADVANTAGES:
i. Increasing battery usage will decrease latency and leasing costs, but also
limits the lifetime of the mobile device.
ii. Conversely, the lifetime of the device can be extended by increasing
leasing costs which will decrease latency and battery usage.
PROPOSED SYSTEM:
A user request originates at the Mobile Station (MS). In order to be
completed, the request must be transmitted upstream to a remote Application Server (AS) via a
Base Station (BS) and a series of relay nodes. We refer to the node at the first hop as the base
station, but emphasize that the links between the BS, relay nodes, and AS may be wired or
wireless. Similarly running a text to speech conversion application for usage scenarios.
ADVANTAGES:
i. If the request processing is entirely done at the MS, the limited battery
power can be drained.
ii. If the processing is done at the AS, communication latency can be high
due to limited bandwidth of the wireless access link and large query size.
MODULES:
1. Leasing Model
2. Relaying Strategies
3. Multi-hop Transmission
LEASING MODEL:
Utilizing the processing power of intermediary nodes is the main idea behind
Network-Assisted Mobile Computing. Leasing processing power from mid-network nodes can
be extremely beneficial to reduce latency and to extend the battery life of a mobile device.
However, it comes with a cost. These costs can capture the fee required to lease CPU power
from the mid-network nodes. Additionally, these costs may capture potential security risks by
giving access of client data to these nodes. Some operations, such as transcoding, can be done on
Encrypted data, while other would require decrypting the data. The mobile station send one
sentence for ex: (how are you), in the application server receive the sentence into audio.
RELAYING STRATEGIES:
• Amplify-and-forward
• Decode-and-forward
In amplify-and-forward, the relay nodes simply boost the energy of the signal received from the
sender and retransmit it to the receiver. In decode-and-forward, the relay nodes will perform
physical-layer decoding and then forward the decoding result to the destinations. If multiple
nodes are available for cooperation, their antennas can employ a space-time code in transmitting
the relay signals. It is shown that cooperation at the physical layer can achieve full levels of
diversity similar to a system, and hence can reduce the interference and increase the connectivity
of wireless networks.
MULTI-HOP TRANSMISSION:
Multi-hop transmission can be illustrated using two-hop transmission. When two-hop
transmission is used, two time slots are consumed. In the first slot, messages are transmitted from
the mobile station to the relay, and the messages will be forwarded to the Application Server in
the second slot. The outage capacity of this two-hop transmission can be derived considering the
outage of each hop transmission.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Color.
 Mouse : Logitech.
 Ram : 512 MB.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP Professional.
 Coding Language : C#.NET

Contenu connexe

Tendances

Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
IJRAT
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Kumar Goud
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
Vennila Raja
 

Tendances (14)

Enhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems usingEnhancement of qos in lte downlink systems using
Enhancement of qos in lte downlink systems using
 
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to increase the capacity of hybrid w...
 
A3
A3A3
A3
 
Power controlled medium access control
Power controlled medium access controlPower controlled medium access control
Power controlled medium access control
 
A distributed three hop routing protocol to
A distributed three hop routing protocol toA distributed three hop routing protocol to
A distributed three hop routing protocol to
 
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
 
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...IRJET-  	  Channel Allocation Strategy for Multiuser Cognitive and Location A...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
 
Paper id 24201445
Paper id 24201445Paper id 24201445
Paper id 24201445
 
Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)Iisrt komathi krishna (networks)
Iisrt komathi krishna (networks)
 
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
 
Unit 4
Unit 4Unit 4
Unit 4
 
Ep33852856
Ep33852856Ep33852856
Ep33852856
 
13_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-293813_28739 - IJAES ok 2929-2938
13_28739 - IJAES ok 2929-2938
 
Computing localized power efficient data
Computing localized power efficient dataComputing localized power efficient data
Computing localized power efficient data
 

En vedette

El dinero 7ª
El dinero 7ªEl dinero 7ª
El dinero 7ª
colegio
 
(ENG) CV - Nghiem Thi Huong Mai
(ENG) CV - Nghiem Thi Huong Mai(ENG) CV - Nghiem Thi Huong Mai
(ENG) CV - Nghiem Thi Huong Mai
Mai Nghiem
 
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
Stephen Cote
 
Trastorno narcisista de personalidad
Trastorno narcisista de personalidadTrastorno narcisista de personalidad
Trastorno narcisista de personalidad
Gpe Sarmiento
 

En vedette (16)

Prezka nalepki
Prezka nalepkiPrezka nalepki
Prezka nalepki
 
Busqueda de informacion en internet
Busqueda de informacion en internetBusqueda de informacion en internet
Busqueda de informacion en internet
 
El dinero 7ª
El dinero 7ªEl dinero 7ª
El dinero 7ª
 
YEG DPM Talk - January 16, 2017
YEG DPM Talk - January 16, 2017YEG DPM Talk - January 16, 2017
YEG DPM Talk - January 16, 2017
 
Capital intectual sala 3
Capital intectual sala 3Capital intectual sala 3
Capital intectual sala 3
 
Anecdota De Gbi
Anecdota  De GbiAnecdota  De Gbi
Anecdota De Gbi
 
(ENG) CV - Nghiem Thi Huong Mai
(ENG) CV - Nghiem Thi Huong Mai(ENG) CV - Nghiem Thi Huong Mai
(ENG) CV - Nghiem Thi Huong Mai
 
La web2.0
La web2.0La web2.0
La web2.0
 
Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...Behavior rule specification based intrusion detection for safety critical med...
Behavior rule specification based intrusion detection for safety critical med...
 
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
Shimadzu Academic Partnership University of Illinois Chicago Mass Spectromete...
 
Malware propagation in large scale networks
Malware propagation in large scale networksMalware propagation in large scale networks
Malware propagation in large scale networks
 
Towards effective bug triage with software
Towards effective bug triage with softwareTowards effective bug triage with software
Towards effective bug triage with software
 
Teoria de-la-creacion-dinamica-de-conocimiento-organizacional-20131109
 Teoria de-la-creacion-dinamica-de-conocimiento-organizacional-20131109 Teoria de-la-creacion-dinamica-de-conocimiento-organizacional-20131109
Teoria de-la-creacion-dinamica-de-conocimiento-organizacional-20131109
 
Factores de diversidad humana
Factores de diversidad humanaFactores de diversidad humana
Factores de diversidad humana
 
Psicología y sus ramas
Psicología y sus ramasPsicología y sus ramas
Psicología y sus ramas
 
Trastorno narcisista de personalidad
Trastorno narcisista de personalidadTrastorno narcisista de personalidad
Trastorno narcisista de personalidad
 

Similaire à Network assisted mobile computing with optimal uplink quary processing

Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
IJTET Journal
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
IJARIIT
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
M H
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
1crore projects
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
Aashish Pande
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
Iaetsd Iaetsd
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
Farhad Gholami
 

Similaire à Network assisted mobile computing with optimal uplink quary processing (20)

Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell Energy efficient relaying via store-carry and forward within the cell
Energy efficient relaying via store-carry and forward within the cell
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projectsM phil-computer-science-wireless-communication-projects
M phil-computer-science-wireless-communication-projects
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN NetworksCall Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
 
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
 
WIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORKWIRLESS CLOUD NETWORK
WIRLESS CLOUD NETWORK
 
Node Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor NetworksNode Deployment Technique using Wireless Sensor Networks
Node Deployment Technique using Wireless Sensor Networks
 
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
 
To Reduce The Handover Delay In Wimax When The Mobile Station Moves At Higher...
To Reduce The Handover Delay In Wimax When The Mobile Station Moves At Higher...To Reduce The Handover Delay In Wimax When The Mobile Station Moves At Higher...
To Reduce The Handover Delay In Wimax When The Mobile Station Moves At Higher...
 
High Performance Communication Networks 2
High Performance Communication Networks 2High Performance Communication Networks 2
High Performance Communication Networks 2
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data int...
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Iaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensiveIaetsd use of mobile communication in data-intensive
Iaetsd use of mobile communication in data-intensive
 
Direct_studies_report13
Direct_studies_report13Direct_studies_report13
Direct_studies_report13
 
Wireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop RoutingWireless Sensor Network Using Six Sigma Multi Hop Routing
Wireless Sensor Network Using Six Sigma Multi Hop Routing
 

Plus de Shakas Technologies

Plus de Shakas Technologies (20)

A Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying DetectionA Review on Deep-Learning-Based Cyberbullying Detection
A Review on Deep-Learning-Based Cyberbullying Detection
 
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
 
A Novel Framework for Credit Card.
A Novel Framework for Credit Card.A Novel Framework for Credit Card.
A Novel Framework for Credit Card.
 
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
 
NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024NS2 Final Year Project Titles 2023- 2024
NS2 Final Year Project Titles 2023- 2024
 
MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024MATLAB Final Year IEEE Project Titles 2023-2024
MATLAB Final Year IEEE Project Titles 2023-2024
 
Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024Latest Python IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
 
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
 
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSECYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
 
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...Detecting Mental Disorders in social Media through Emotional patterns-The cas...
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
 
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTIONCOMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
 
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCECO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
 
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
 
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
 
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
 
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
 
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
 
Fighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docxFighting Money Laundering With Statistics and Machine Learning.docx
Fighting Money Laundering With Statistics and Machine Learning.docx
 
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
 
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
 

Dernier

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Dernier (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Network assisted mobile computing with optimal uplink quary processing

  • 1. NETWORK ASSISTED MOBILE COMPUTING WITH OPTIMAL UPLINK QUERY PROCESSING ABSTRACT: Many mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user-queries at remote servers can have slow response times due communication latency incurred during transmission of the potentially large query. We evaluate a network-assisted mobile computing scenario where midnetwork nodes with “leasing” capabilities are deployed by a service provider. Leasing computation power can reduce battery usage on the mobile devices and improve response times. However, borrowing processing power from mid-network nodes comes at a leasing cost which must be accounted for when making the decision of where processing should occur. We study the tradeoff between battery usage, processing and transmission latency, and mid-network leasing. We use the dynamic programming framework to solve for the optimal processing policies that suggest the amount of processing to be done at each mid-network node in order to minimize the processing and communication latency and processing costs. Through numerical studies, we examine the properties of the optimal processing policy and the core tradeoffs in such systems.
  • 2. ARCHITECTURE: EXISTING SYSTEM: In the previous section we identified special properties of the optimal processing policy under various scenarios. We now examine some of these properties through numerical studies with example cost functions and systems. Latency, battery usage, and leasing costs have a tightly woven relationship. DISADVANTAGES: i. Increasing battery usage will decrease latency and leasing costs, but also limits the lifetime of the mobile device. ii. Conversely, the lifetime of the device can be extended by increasing leasing costs which will decrease latency and battery usage. PROPOSED SYSTEM:
  • 3. A user request originates at the Mobile Station (MS). In order to be completed, the request must be transmitted upstream to a remote Application Server (AS) via a Base Station (BS) and a series of relay nodes. We refer to the node at the first hop as the base station, but emphasize that the links between the BS, relay nodes, and AS may be wired or wireless. Similarly running a text to speech conversion application for usage scenarios. ADVANTAGES: i. If the request processing is entirely done at the MS, the limited battery power can be drained. ii. If the processing is done at the AS, communication latency can be high due to limited bandwidth of the wireless access link and large query size. MODULES: 1. Leasing Model 2. Relaying Strategies 3. Multi-hop Transmission LEASING MODEL: Utilizing the processing power of intermediary nodes is the main idea behind Network-Assisted Mobile Computing. Leasing processing power from mid-network nodes can be extremely beneficial to reduce latency and to extend the battery life of a mobile device. However, it comes with a cost. These costs can capture the fee required to lease CPU power from the mid-network nodes. Additionally, these costs may capture potential security risks by giving access of client data to these nodes. Some operations, such as transcoding, can be done on
  • 4. Encrypted data, while other would require decrypting the data. The mobile station send one sentence for ex: (how are you), in the application server receive the sentence into audio. RELAYING STRATEGIES: • Amplify-and-forward • Decode-and-forward In amplify-and-forward, the relay nodes simply boost the energy of the signal received from the sender and retransmit it to the receiver. In decode-and-forward, the relay nodes will perform physical-layer decoding and then forward the decoding result to the destinations. If multiple nodes are available for cooperation, their antennas can employ a space-time code in transmitting the relay signals. It is shown that cooperation at the physical layer can achieve full levels of diversity similar to a system, and hence can reduce the interference and increase the connectivity of wireless networks. MULTI-HOP TRANSMISSION: Multi-hop transmission can be illustrated using two-hop transmission. When two-hop transmission is used, two time slots are consumed. In the first slot, messages are transmitted from the mobile station to the relay, and the messages will be forwarded to the Application Server in the second slot. The outage capacity of this two-hop transmission can be derived considering the outage of each hop transmission. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 5.  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Color.  Mouse : Logitech.  Ram : 512 MB. SOFTWARE REQUIREMENTS:  Operating system : Windows XP Professional.  Coding Language : C#.NET