SlideShare a Scribd company logo
Network-Assisted Mobile Computing with Optimal Uplink
Query Processing
ABSTRACT:
Many mobile applications retrieve content from remote servers via user generated
queries. Processing these queries is often needed before the desired content can be
identified. Processing the request on the mobile devices can quickly sap the limited
battery resources. Conversely, processing user queries at remote servers can have
slow response times due communication latency incurred during transmission of
the potentially large query. We evaluate a network-assisted mobile computing
scenario where mid-network nodes with “leasing” capabilities are deployed by a
service provider. Leasing computation power can reduce battery usage on the
mobile devices and improve response times. However, borrowing processing
power from mid-network nodes comes at a leasing cost which must be accounted
for when making the decision of where processing should occur. We study the
tradeoff between battery usage, processing and transmission latency, and mid-
network leasing. We use the dynamic programming framework to solve for the
optimal processing policies that suggest the amount of processing to be done at
each mid-network node in order to minimize the processing and communication
latency and processing costs. Through numerical studies, we examine the
properties of the optimal processing policy and the core tradeoffs in such systems
EXISTING SYSTEM:
In the previous section we identified special properties of the optimal processing
policy under various scenarios. We now examine some of these properties through
numerical studies with example cost functions and systems. Latency, battery usage,
and leasing costs have a tightly woven relationship.
DISADVANTAGES OF EXISTING SYSTEM:
1) Increasing battery usage will decrease latency and leasing costs, but also limits
the lifetime of the mobile device
2) Conversely, the lifetime of the device can be extended by increasing leasing
costs which will decrease latency and battery usage.
PROPOSED SYSTEM:
A user request originates at the Mobile Station (MS). In order to be
completed, the request must be transmitted upstream to a remote Application
Server (AS) via a Base Station (BS) and a series of relay nodes. We refer to the
node at the first hop as the base station, but emphasize that the links between the
BS, relay nodes, and AS may be wired or wireless. Similarly running a text to
speech conversion application for usage scenarios.
ADVANTAGES OF PROPOSED SYSTEM:
1) If the request processing is entirely done at the MS, the limited battery power
can be drained.
2) If the processing is done at the AS, communication latency can be high due to
limited bandwidth of the wireless access link and large query size.
MODULES:
1. Leasing Model
2. Relaying Strategies
3. Multi-hop Transmission
MODULES DESCRIPTION:
Leasing Model:
Utilizing the processing power of intermediary nodes is the main idea behind
Network-Assisted Mobile Computing. Leasing processing power from mid-
network nodes can be extremely beneficial to reduce latency and to extend the
battery life of a mobile device. However, it comes with a cost. These costs can
capture the fee required to lease CPU power from the mid-network nodes.
Additionally, these costs may capture potential security risks by giving access of
client data to these nodes. Some operations, such as transcoding, can be done on
Encrypted data, while other would require decrypting the data. The mobile station
send one sentence for ex: (how are you), in the application server receive the
sentence into audio.
Relaying Strategies:
• Amplify-and-forward
• Decode-and-forward
In amplify-and-forward, the relay nodes simply boost the energy of the signal
received from the sender and retransmit it to the receiver. In decode-and-forward,
the relay nodes will perform physical-layer decoding and then forward the
decoding result to the destinations. If multiple nodes are available for cooperation,
their antennas can employ a space-time code in transmitting the relay signals. It is
shown that cooperation at the physical layer can achieve full levels of diversity
similar to a system, and hence can reduce the interference and increase the
connectivity of wireless networks.
Multi-hop Transmission:
Multi-hop transmission can be illustrated using two-hop transmission. When two-
hop transmission is used, two time slots are consumed. In the first slot, messages
are transmitted from the mobile station to the relay, and the messages will be
forwarded to the Application Server in the second slot. The outage capacity of this
two-hop transmission can be derived considering the outage of each hop
transmission.
HARDWARE & SOFTWARE REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 MB.
SOFTWARE REQUIREMENTS:
Operating system : Windows XP Professional.
Coding Language : C#.NET
ARCHITECTURE:
REFERENCE:
Carri W. Chan,Member, IEEE, Nicholas Bambos, Member, IEEE, and Jatinder Pal
Singh,Member, IEEE “Network-Assisted Mobile Computing with Optimal Uplink
Query Processing”- IEEE TRANSACTIONS ON MOBILE COMPUTING,
VOL. 12, NO. 6, JUNE 2013.

More Related Content

PDF
Network assisted mobile computing with optimal uplink quary processing
PDF
Wireless body area networks
PDF
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
PDF
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
PDF
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
PDF
Enhancement of qos in lte downlink systems using
PDF
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...
Network assisted mobile computing with optimal uplink quary processing
Wireless body area networks
Dotnet power allocation for statistical qo s provisioning in opportunistic m...
Downlink beamforming and admissin control for spectrum sharing cognitive radi...
An Approach for Enhanced Performance of Packet Transmission over Packet Switc...
Enhancement of qos in lte downlink systems using
Resource Allocation in MIMO – OFDM Communication System under Signal Strength...

What's hot (14)

PDF
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
PDF
Iisrt komathi krishna (networks)
PDF
13_28739 - IJAES ok 2929-2938
PDF
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
PDF
On the performance of energy harvesting AF partial relay selection with TAS a...
PDF
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
PDF
Ep33852856
PPT
Sensor Protocols for Information via Negotiation (SPIN)
PDF
A distributed three hop routing protocol to increase the capacity of hybrid w...
PDF
DOCX
A distributed three hop routing protocol to
DOCX
Power allocation for statistical qo s provisioning in
PDF
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
PPT
Directed diffusion for wireless sensor networking
Energy Behavior in Ad Hoc Network Minimizing the Number of Hops and Maintaini...
Iisrt komathi krishna (networks)
13_28739 - IJAES ok 2929-2938
IRJET- Energy Efficient Underwater Routing Protocol with Void Avoidance and B...
On the performance of energy harvesting AF partial relay selection with TAS a...
IRJET- Channel Allocation Strategy for Multiuser Cognitive and Location A...
Ep33852856
Sensor Protocols for Information via Negotiation (SPIN)
A distributed three hop routing protocol to increase the capacity of hybrid w...
A distributed three hop routing protocol to
Power allocation for statistical qo s provisioning in
Performance Analysis and Comparison of Routing Protocols in Wireless Sensor N...
Directed diffusion for wireless sensor networking
Ad

Viewers also liked (19)

DOCX
Participatory privacy enabling privacy in participatory sensing
DOCX
Identity based secure distributed data storage schemes
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
Proteus multiflow diversity routing for wireless networks with cooperative tr...
DOCX
Towards secure multi keyword top-k retrieval over encrypted cloud data
DOCX
A rank correlation based detection against distributed reflection do s attacks
DOCX
Using fuzzy logic control to provide intelligent traffic management service f...
PDF
Facilitating document annotation using content and querying value
PDF
2013 14 ieee ece project titles - jp infotech
DOCX
Distributed cooperative caching in social wireless networks
PDF
2013 ieee java project titles for cse, it and mca
DOCX
A highly scalable key pre distribution scheme for wireless sensor networks
DOCX
Privacy preserving delegated access control in public clouds
DOC
IEEE PROJECTS FOR ECE 2013 2014
PDF
final year ieee projects in pondicherry
PDF
Twitsper tweeting privately
DOCX
Efficient algorithms for neighbor discovery in wireless networks
DOCX
Toward fine grained, unsupervised, scalable performance diagnosis for product...
DOCX
Secure mining of association rules in horizontally distributed databases
Participatory privacy enabling privacy in participatory sensing
Identity based secure distributed data storage schemes
Back pressure-based packet-by-packet adaptive routing in communication networks
Proteus multiflow diversity routing for wireless networks with cooperative tr...
Towards secure multi keyword top-k retrieval over encrypted cloud data
A rank correlation based detection against distributed reflection do s attacks
Using fuzzy logic control to provide intelligent traffic management service f...
Facilitating document annotation using content and querying value
2013 14 ieee ece project titles - jp infotech
Distributed cooperative caching in social wireless networks
2013 ieee java project titles for cse, it and mca
A highly scalable key pre distribution scheme for wireless sensor networks
Privacy preserving delegated access control in public clouds
IEEE PROJECTS FOR ECE 2013 2014
final year ieee projects in pondicherry
Twitsper tweeting privately
Efficient algorithms for neighbor discovery in wireless networks
Toward fine grained, unsupervised, scalable performance diagnosis for product...
Secure mining of association rules in horizontally distributed databases
Ad

Similar to Network assisted mobile computing with optimal uplink query processing (20)

PDF
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
PDF
M.E Computer Science Wireless Communication Projects
PDF
M phil-computer-science-wireless-communication-projects
PDF
M.Phil Computer Science Wireless Communication Projects
PDF
Iaetsd increasing network life span of manet by using
PDF
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
DOCX
Ieee transactions 2018 on wireless communications Title and Abstract
DOC
Energy efficient relaying via store-carry and forward within the cell
PDF
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
PDF
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
PDF
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
PDF
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
PDF
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
DOCX
Ieee transactions 2018 topics on wireless communications for final year stude...
DOCX
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
DOC
Direct_studies_report13
PDF
Iaetsd use of mobile communication in data-intensive
PDF
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
PDF
Et24912915
PDF
A new algorithm to improve the sharing of bandwidth
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
M.E Computer Science Wireless Communication Projects
M phil-computer-science-wireless-communication-projects
M.Phil Computer Science Wireless Communication Projects
Iaetsd increasing network life span of manet by using
Civilizing the Network Lifespan of Manets Through Cooperative Mac Protocol Me...
Ieee transactions 2018 on wireless communications Title and Abstract
Energy efficient relaying via store-carry and forward within the cell
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid W...
DYNAMIC CONGESTION CONTROL IN WDM OPTICAL NETWORK
Adaptive Routing in Wireless Sensor Networks: QoS Optimisation for Enhanced A...
 
Call Admission Control (CAC) with Load Balancing Approach for the WLAN Networks
Ieee transactions 2018 topics on wireless communications for final year stude...
Asoka_Korale_Event_based_CYM_IET_2013_submitted linkedin
Direct_studies_report13
Iaetsd use of mobile communication in data-intensive
Effective Replicated Server Allocation Algorithms in Mobile computing Systems
Et24912915
A new algorithm to improve the sharing of bandwidth

Recently uploaded (20)

PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Insiders guide to clinical Medicine.pdf
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Classroom Observation Tools for Teachers
PDF
Basic Mud Logging Guide for educational purpose
PPTX
Cell Types and Its function , kingdom of life
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
PPH.pptx obstetrics and gynecology in nursing
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Pre independence Education in Inndia.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
VCE English Exam - Section C Student Revision Booklet
Microbial disease of the cardiovascular and lymphatic systems
Module 4: Burden of Disease Tutorial Slides S2 2025
Insiders guide to clinical Medicine.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
Classroom Observation Tools for Teachers
Basic Mud Logging Guide for educational purpose
Cell Types and Its function , kingdom of life
STATICS OF THE RIGID BODIES Hibbelers.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPH.pptx obstetrics and gynecology in nursing

Network assisted mobile computing with optimal uplink query processing

  • 1. Network-Assisted Mobile Computing with Optimal Uplink Query Processing ABSTRACT: Many mobile applications retrieve content from remote servers via user generated queries. Processing these queries is often needed before the desired content can be identified. Processing the request on the mobile devices can quickly sap the limited battery resources. Conversely, processing user queries at remote servers can have slow response times due communication latency incurred during transmission of the potentially large query. We evaluate a network-assisted mobile computing scenario where mid-network nodes with “leasing” capabilities are deployed by a service provider. Leasing computation power can reduce battery usage on the mobile devices and improve response times. However, borrowing processing power from mid-network nodes comes at a leasing cost which must be accounted for when making the decision of where processing should occur. We study the tradeoff between battery usage, processing and transmission latency, and mid- network leasing. We use the dynamic programming framework to solve for the optimal processing policies that suggest the amount of processing to be done at each mid-network node in order to minimize the processing and communication
  • 2. latency and processing costs. Through numerical studies, we examine the properties of the optimal processing policy and the core tradeoffs in such systems EXISTING SYSTEM: In the previous section we identified special properties of the optimal processing policy under various scenarios. We now examine some of these properties through numerical studies with example cost functions and systems. Latency, battery usage, and leasing costs have a tightly woven relationship. DISADVANTAGES OF EXISTING SYSTEM: 1) Increasing battery usage will decrease latency and leasing costs, but also limits the lifetime of the mobile device 2) Conversely, the lifetime of the device can be extended by increasing leasing costs which will decrease latency and battery usage. PROPOSED SYSTEM: A user request originates at the Mobile Station (MS). In order to be completed, the request must be transmitted upstream to a remote Application Server (AS) via a Base Station (BS) and a series of relay nodes. We refer to the node at the first hop as the base station, but emphasize that the links between the
  • 3. BS, relay nodes, and AS may be wired or wireless. Similarly running a text to speech conversion application for usage scenarios. ADVANTAGES OF PROPOSED SYSTEM: 1) If the request processing is entirely done at the MS, the limited battery power can be drained. 2) If the processing is done at the AS, communication latency can be high due to limited bandwidth of the wireless access link and large query size. MODULES: 1. Leasing Model 2. Relaying Strategies 3. Multi-hop Transmission
  • 4. MODULES DESCRIPTION: Leasing Model: Utilizing the processing power of intermediary nodes is the main idea behind Network-Assisted Mobile Computing. Leasing processing power from mid- network nodes can be extremely beneficial to reduce latency and to extend the battery life of a mobile device. However, it comes with a cost. These costs can capture the fee required to lease CPU power from the mid-network nodes. Additionally, these costs may capture potential security risks by giving access of client data to these nodes. Some operations, such as transcoding, can be done on Encrypted data, while other would require decrypting the data. The mobile station send one sentence for ex: (how are you), in the application server receive the sentence into audio. Relaying Strategies: • Amplify-and-forward • Decode-and-forward In amplify-and-forward, the relay nodes simply boost the energy of the signal received from the sender and retransmit it to the receiver. In decode-and-forward,
  • 5. the relay nodes will perform physical-layer decoding and then forward the decoding result to the destinations. If multiple nodes are available for cooperation, their antennas can employ a space-time code in transmitting the relay signals. It is shown that cooperation at the physical layer can achieve full levels of diversity similar to a system, and hence can reduce the interference and increase the connectivity of wireless networks. Multi-hop Transmission: Multi-hop transmission can be illustrated using two-hop transmission. When two- hop transmission is used, two time slots are consumed. In the first slot, messages are transmitted from the mobile station to the relay, and the messages will be forwarded to the Application Server in the second slot. The outage capacity of this two-hop transmission can be derived considering the outage of each hop transmission. HARDWARE & SOFTWARE REQUIREMENTS: HARDWARE REQUIREMENTS: System : Pentium IV 2.4 GHz. Hard Disk : 40 GB.
  • 6. Floppy Drive : 1.44 Mb. Monitor : 15 VGA Color. Mouse : Logitech. Ram : 512 MB. SOFTWARE REQUIREMENTS: Operating system : Windows XP Professional. Coding Language : C#.NET ARCHITECTURE:
  • 7. REFERENCE: Carri W. Chan,Member, IEEE, Nicholas Bambos, Member, IEEE, and Jatinder Pal Singh,Member, IEEE “Network-Assisted Mobile Computing with Optimal Uplink Query Processing”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 6, JUNE 2013.