13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

IDEA: An Iterative-Deepen<strong>in</strong>g Algorithm for Energy-Efficient Query<strong>in</strong>g 203at a very low rate (thus ma<strong>in</strong> energy is dra<strong>in</strong>ed <strong>by</strong> stay<strong>in</strong>g <strong>in</strong> active mode); <strong>in</strong>this case it can broadcast a t-token to declare a new token of its availability.Thus the generation of these tokens is primarily driven <strong>by</strong> the energy constra<strong>in</strong>tsof respective nodes. Section 5 describes the energy-based token generation modelused dur<strong>in</strong>g experiments.One po<strong>in</strong>t of discussion <strong>in</strong> the token generation algorithm is the primarymetric to be used. In the discussion so far energy has been the primary factor,and it would be the case for majority of applications. But suppose the networkconsists of mobile computers or handhelds which can be charged frequently,then energy might not be most important criteria. Another metric which playsan important role <strong>in</strong> search<strong>in</strong>g is the connectivity and the ability to forward tonodes that lead to appropriate results. For example, nodes which have previouslyreplied to the queries at a high frequency could be used to declare tokens ofavailability. Another criterion would be to use neighbors that have respondedwith messages with least number of hops. This is a very application specificmetris, which is beyond the scope of this paper.The T-IDEA search forwards the query message(s) to just a subset of itsneighbors, based on the token-declaration made <strong>by</strong> the neighbor<strong>in</strong>g mobile nodes.By send<strong>in</strong>g the query to a small subset of neighbor nodes, we will likely reducethe costs <strong>in</strong>curred <strong>by</strong> the nodes dur<strong>in</strong>g query process<strong>in</strong>g and forward<strong>in</strong>g. Onthe other hand, <strong>by</strong> select<strong>in</strong>g neighbors which wold produce many results, we canma<strong>in</strong>ta<strong>in</strong> quality of results to a large degree, even though fewer nodes are visited.4.2 Resilient SearchThis search algorithm is a controlled flood<strong>in</strong>g approach which depends on nodesof the ad-hoc network identify<strong>in</strong>g themselves to be a part of the search<strong>in</strong>g network.One drawback of such a scheme, isthe <strong>in</strong>creased probability of failure thanflood<strong>in</strong>g (where even if a node dies the query can propagated <strong>by</strong> some part ofthe network). This is possible <strong>in</strong> cases described earlier when a node experiencesheavy energy dra<strong>in</strong>age than predicted dur<strong>in</strong>g the token declaration (dueto <strong>in</strong>crease <strong>in</strong> query process<strong>in</strong>g rate).This problem is alleviated <strong>by</strong> use of keep-alive messages. If a query is forwardedfor certa<strong>in</strong> number of hops, as declared <strong>in</strong> the i-Rule, we need to sendexplicit keep-alive messages. In case if the source node receives query responsemessages, they are considered to be implicit keep-alive messages. But if thesource does not receive either of them it can re-issue the query.4.3 Distributed Token Declaration AlgorithmA more distributed token declaration scheme for the nodes <strong>in</strong> the ad hoc network,would be to assign tokens to neighbors <strong>in</strong> proportion to their capacities. Based onthe previous tokens received from your neighbors, the neighbor<strong>in</strong>g node whichdeclares high capacity is assigned more tokens for query<strong>in</strong>g the current node.This distributed token-algorithm is similar to fair queu<strong>in</strong>g policies used for flowfairness <strong>in</strong> networks.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!