Caching Strategies Based on Data Density Estimation in Mobile Ad-hoc Networks


  • Bandi Bhaskar
  • Dandugudum. Mahesh
  • Palleboina. Kumaraswamy
  • Yamsani. Nagender



Mobile Ad-hoc networks (MANETs), Cooperative caching, Cache discovery


Current data caching technique not only for additional networks with p2p nodes distributing metadata items. Our primary objective would be to implement a new asymmetrical mutually beneficial cache campaign strategy, in which many metadata appeals are actually interesting conveyed to anything other than the cache layer on each and every node, but perhaps metadata replies could perhaps really be communicated cache layer, even to the optimal nodes that would have to be cached. This solution not only reduces overhead to replicate data between user spaces  Yet another intention of this same paper is to introduce the MAODV and ODMRP algorithms for the new disproportionate supportive cache method where it calculate the two routing protocols proposed, namely MAODV and ODMRP, for performance - based wireless ad hoc networks. This same paper examines the overall performance of two controversial ad hoc network multicast protocols: MAODV and ODMRP. MAODV continues to build and retains a hard state - based multicast tree, ODMRP maintains a soft state - based mesh. Even our own results demonstrate in numerous situations ODMRP attains a higher packet delivery ratio, nonetheless outcomes in much higher overheads.





[1] Madhavarao Boddu, K. Suresh Joseph, “Improving Data Accessibility and Query Delay in Cluster based Cooperative Caching (CBCC) in MANET using LFU-MINâ€, International Journal of Computer Applications Vol. 21, No.9, pp-37-42, May 2011.

[2] Schollmeier, R., and I. Gruber. “Routing in Mobile Ad Hoc and Peer-to-Peer Networks, A Comparison.†2003.

[3] Beraldi, R., and R. Baldoni. “A Caching Scheme for Routing in Mobile Ad Hoc Networks and Its Application to ZRP.†IEEE Transactions on Computers 52 (2003).0.

[4] Omer K. Jasim, Safia Abbas and El-Sayed M. Horbaty, “Evolution of an Emerging Symmetric Quantum Cryptographic Algorithmâ€, Journal of Information Security, Vol. 6, pp. 82-92, 2015

[5] Ayman T., Ayman K. and Ali C., "Authentication Schemes for Wireless Sensor Networks," in Mediterranean Electrotechnical Conference (MELECON), IEEE, pp. 367-372, 2014

[6] Cao, G., L. Yin, and C. Das. “Cooperative Cache-Based Data Access in Ad Hoc Networks.†IEEE Computer, 2004.

[7] Wakikawa, R., J. Malinen, C. Perkins, A. Nilsson, and A. Tuominen. Global Connectivity for IPv6 Mobile Ad Hoc Networks. Internet Draft, Internet Engineering Task Force, 2006.

[8] González-Cañete, F., E. Casilari, and A. Trivino. “Proposal and Evaluation of an Application Level Caching Scheme for Ad Hoc Networks.†IWCMC’09. Leipzig, Germany, 2009.

[9] Gitzenis, S., and N. Bambos. “Power controlled data prefetching/caching in wireless packet networks.†Proceedings of IEEE INFOCOM. 2002.

[10] Grassi, V. “Prefetching policies for energy saving and latency reduction in a wireless broadcast data delivery system,.†Proceedings of the 3rd ACM International Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems. 2000.

[11] Narottam Chand, R.C. Joshi and Manoj Misra, “Efficient Cooperative Caching in Ad Hoc Networksâ€, IEEE Transactions, pp.1-8, August 2006.

[12] P. Kuppusamy, K. Thirunavukkarasu and B. Kalaavathi,†Cluster Based Cooperative Caching Technique in Mobile Ad Hoc Networksâ€, European Journal of Scientific Research Vol.69 No.3 pp. 337-349, 20123.

[13] Jiang, C., Li B. and Xu H. “An Efficient Scheme for User Authentication in Wireless Sensor Networks†21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07) 2007.

[14] Gowdiperu Sucharitha, Srinivas Aluvala, Deepika Vodnala, Y.Nagender, "A Survey on Mobile Ad-hoc Social Networks for Efficient Data Query in Intermittently Connected System" in International Journal on Innovative Research in Computer and Communication Engineering , Volume 3, Issue 11, Page No(s) 11831 - 1183, NOV. 2015, [ISSN (Print):2320 - 9801], DOI: 10.15680/IJIRCCE.201.

[15] Srinivas Aluvala, K. Raja Sekar, Deepika Vodnala, "Analysis of Security Threats and Issues in MANETs" in International Journal on Advanced Computer Theory and Engineering, Volume 4, Issue 5, Page No(s) 23 - 28, JUN. 2015, [ISSN(Print):2319-2526]

[16] Srinivas Aluvala, K. Raja Shekar, Deepika Vodnala, "An Empirical Study of Routing Attacks in Mobile Ad-hoc Networks" in Elsevier - Procedia Computer Science, Volume 92, Issue 1, Page No(s) 554 - 561, JUL. 2016, [ISSN (Print):1877-0509], DOI:10.1016/j.procs.2016.

[17] Srinivas Aluvala, K. Raja Sekar,, Deepika Vodnala, "A Novel Technique for Node Authentication in Mobile Ad-hoc Networks" in Elsevier - Perspectives in Science, Volume 8, Issue 1, Page No(s) 680 - 682, SEP. 2016, [ISSN(Print):2213-0209], DOI:10.1016/j.pisc.2016.

[18] Deepika Vodnala, Dr. S. Phani Kumar, Srinivas Aluvala, "L2R: Multicast Routing Protocol for Effective Localized Route Recovery in Backbone Networks" in International Journal of Control Theory and Applications, Volume 33, Issue 9, Page No(s) 79 - 87, JUL. 2016, [ISSN(Print):0974-5572]

View Full Article: