scholarly journals Supporting User Mobility through Cache Relocation

2005 ◽  
Vol 1 (4) ◽  
pp. 275-307 ◽  
Author(s):  
Kwong Yuen Lai ◽  
Zahir Tari ◽  
Peter Bertok

Traffic and access delay can be reduced in a mobile network by caching data objects at network nodes near the clients. Traditional caching techniques, however, are unsuitable in this environment because they do not account for the changing location of the users. To deal with this problem, cache relocation techniques can be applied to dynamically relocate data objects so they remain close to the moving clients. Existing relocation techniques rely heavily on path prediction. Unfortunately, the inaccuracy of path prediction can lead to high relocation overhead and poor response time. This paper presents an analytical study of the effects of client mobility on network cache performance. Two new cache relocation techniques are proposed to deal with the issue of poor path prediction and reduce the overhead of existing cache relocation schemes. The first technique, 2PR, compensates for poor path prediction by temporarily moving data objects to a common parent node prior to a handover. Objects are moved to the correct destination once the client's new location has been confirmed. The second technique, ROLP, reduces the traffic overhead associated with cache relocation by ensuring duplicate objects are not relocated and relocation of objects are performed only from the nearest node to the destination. Test results show that 2PR reduces the query delay experienced by mobile clients by 60 to 83% after handovers, while ROLP reduces the overhead of cache relocation by between 33 to 65% compared to existing schemes.

2020 ◽  
Vol 5 (1) ◽  
pp. 39
Author(s):  
Erwan Ridha Muzakki ◽  
Diana Wibowo ◽  
Nolista Indah Rasyid

Background: Malocclusion creates problems in mastication, swallowing, speech, high risk of trauma, periodontal disease, caries and decreased aesthetic which can affect psychosocial. People with malocclusion often receive poor response from others, such as insult or inappropriate nickname. The psychological effects on people with malocclusion include inferiority, embarrassment, difficulty in adaptation, emotional disorder, lack of confidence, uncomfortable social interaction, unhappy, and often compare themselves with others. These will affect a person’s development, especially during adolescence. Objective: The purpose of this research was to know about correlation between the orthodontic treatment needs with the psychosocial condition in adolescent at SMPN 1 Marabahan. Methods: This research was an observational analytic using cross sectional approach. The sample size using Slovin in this research was 76 students of SMPN 1 Marabahan. Data collection was performed using IOTN-DHC and PIDAQ questionnaire. Data analysis consisted of univariate analysis which described each variable and bivariate analysis with Spearman test. Results: The orthodontic treatment needs at SMPN 1 Marabahan based on the highest IOTN-DHC was in the category of really need the treatment. They were about 40 people (53%). The psychological condition in adolescent based on the highest PIDAQ was on the student with an average score of 45.22. Conclusion: There is a significant correlation between orthodontic treatment needs with the psychosocial condition of adolescent.


2021 ◽  
Vol 2083 (2) ◽  
pp. 022059
Author(s):  
Jian Sun ◽  
Hao Wu ◽  
Zhiyuan Huang ◽  
Binbin Bei ◽  
Songqian Cao ◽  
...  

Abstract With the rapid development and maturity of communication technology, integrated computer technology and sensor technology, small sensors with sensing, computing and communication capabilities have begun to appear all over the world. The sensor network composed of these small sensors has received a lot of attention. This paper studies the low-power wide-area communication gateway for power data transmission. Based on the analysis of the energy consumption strategy of the power data transmission process, the low-power wide-area communication gateway for power data transmission is developed, and the developed gateway was tested. According to the peer test results of the gateway, the packet loss rate of the gateway within 100m is relatively good. Therefore, when arranging network nodes, try to control the transmission distance of the gateway within 100m. The energy consumption test shows that the energy consumption of the gateway is basically in an ideal state.


2020 ◽  
pp. 1-16
Author(s):  
Sarra Mehamel ◽  
Samia Bouzefrane ◽  
Soumya Banarjee ◽  
Mehammed Daoui ◽  
Valentina E. Balas

Caching contents at the edge of mobile networks is an efficient mechanism that can alleviate the backhaul links load and reduce the transmission delay. For this purpose, choosing an adequate caching strategy becomes an important issue. Recently, the tremendous growth of Mobile Edge Computing (MEC) empowers the edge network nodes with more computation capabilities and storage capabilities, allowing the execution of resource-intensive tasks within the mobile network edges such as running artificial intelligence (AI) algorithms. Exploiting users context information intelligently makes it possible to design an intelligent context-aware mobile edge caching. To maximize the caching performance, the suitable methodology is to consider both context awareness and intelligence so that the caching strategy is aware of the environment while caching the appropriate content by making the right decision. Inspired by the success of reinforcement learning (RL) that uses agents to deal with decision making problems, we present a modified reinforcement learning (mRL) to cache contents in the network edges. Our proposed solution aims to maximize the cache hit rate and requires a multi awareness of the influencing factors on cache performance. The modified RL differs from other RL algorithms in the learning rate that uses the method of stochastic gradient decent (SGD) beside taking advantage of learning using the optimal caching decision obtained from fuzzy rules.


Nodes are important aspect of Mobile network. Mobile ad-hoc network means any network that is made at the time of need. Ad-hoc network has its own place in networking. Mobility in network makes it more demandable. Nodes are the device that takes part in network or makes network. Nodes behavior describes network configuration. Genuine node insures you proper working of network with best results as throughput or packet ratio. Presence of malicious nodes differs in comparison to genuine node. Malicious node degrades output of network. Performance metrics noted degradation in their quality when malicious node encounters in network. Malicious nodes in different sets of node density affect the network in different way


Author(s):  
Valery Hladkykh ◽  
Oleg Toroshanko

Ad Hoc sensor network with mobile network nodes is considered. The basic parameters of the bandwidth and quality of the data exchange channel constructed on the sensor network are analyzed. Statistical analysis of network service quality uses a parameter based on Mean Opinion Score (MOS). This parameter takes into account characteristics such as jitter, delay time, and packet loss rate, and allows you to quantify call quality for calls in the range of 1.0 to 5.0. At the stage of designing the sensor network and in the process of its development, the task of choosing a routing algorithm is very important. To solve the problem of optimal routing in the sensor network a partial mathematical model of the network, consisting of N switching nodes and M lines of wireless communication, has been developed. The average time for messages to remain in the line between two network nodes is determined. To improve methods and algorithms for routing in sensory networks, a generalized mathematical model of the routing process in complex networks and methodology has been developed to select the best route or a set of best routes by a set of criteria.For the most complete comparative evaluation of the effectiveness of a route, it is advisable to consider the route metric ‒ the generalized distance selected for the selected service class and the administrative distance ‒ the route parameter by which the degree of confidence in information received from neighboring devices is determined. It is shown that for optimal organization of data flows in a heterogeneous network it is advisable to use routing algorithms with many quality criteria. To do this, you must conduct an ongoing analysis of the characteristics of the network segments and automatically modify the routing tables. The basis of quality functionality is the route metric. In order to increase the reliability of the data on the state of the route, a quantitative (functional) measure of the administrative distance was introduced into the mathematical model. As a tool for evaluating and managing criteria by their relative importance, it is proposed to use the method of analysis of the Saati hierarchy.


2020 ◽  
pp. 15-28
Author(s):  
Alec Brusilovsky ◽  
Ira McDonald

Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.


2015 ◽  
Vol 2015 ◽  
pp. 1-12
Author(s):  
Wenlong Chen ◽  
Zhe Zheng ◽  
Rong Xiao ◽  
Fan Li ◽  
Zhenzhen Sun

Transmission links in wireless sensor networks (WSNs) are prone to failure because of breakdown, movement, and energy depletion of nodes. Aiming at node-intensive environment, this paper proposes a highly reliable forwarding model based on virtual nodes (HRVN) in tree-based topology networks. A virtual node (VN) consists of several neighboring physical sensor nodes, which have common parent node and children nodes. Normally, the physical sensor nodes in the same VN forward packets in a load-balancing scheme. When a sensor node in a VN is in failure, the others would take over its forwarding work immediately. Moreover, the internal changes of a VN are transparent to its parent and children nodes. The experiments prove the model can provide load-balance and fast recovery from failure with low cost.


2021 ◽  
Author(s):  
James Loney

This paper puts forth a critical interpretation of Facebook Inc.'s mobile growth strategy within a present mobile network society. Using Facebook's own promotional and platform policy texts - many authored at a time when the company prepared for public trading - a promotional rhetoric inviting mobile users to actively partake in the site's 'engaging experiences' will be surveyed. The analyst adopts a view that engaging Facebook on mobile devices can be interpreted as an emerging form of hyper-mobile net work generating surplus value filtered towards particular interests (network 'nodes'). I argue that Facebook's source code can be likened to a worksite, albeit a highly decentralized one that, through mobile, bridge virtual influence to physical spaces. To meet such a task, end-users' mobile-specific technical rights will be discussed so far as they interface with other revenue-generating actors. Using a critical discourse analysis framework, this paper explores a grammar of interests portrayed at a key point in Facebook's company history, connecting Facebook's imagined mobile landscape to its initial public offering period.


2021 ◽  
Author(s):  
James Loney

This paper puts forth a critical interpretation of Facebook Inc.'s mobile growth strategy within a present mobile network society. Using Facebook's own promotional and platform policy texts - many authored at a time when the company prepared for public trading - a promotional rhetoric inviting mobile users to actively partake in the site's 'engaging experiences' will be surveyed. The analyst adopts a view that engaging Facebook on mobile devices can be interpreted as an emerging form of hyper-mobile net work generating surplus value filtered towards particular interests (network 'nodes'). I argue that Facebook's source code can be likened to a worksite, albeit a highly decentralized one that, through mobile, bridge virtual influence to physical spaces. To meet such a task, end-users' mobile-specific technical rights will be discussed so far as they interface with other revenue-generating actors. Using a critical discourse analysis framework, this paper explores a grammar of interests portrayed at a key point in Facebook's company history, connecting Facebook's imagined mobile landscape to its initial public offering period.


Sign in / Sign up

Export Citation Format

Share Document