Abstract
Discrete math has countless applications in computer science. This paper also identifies another application in computer networks by developing the possible sequences of interaction among nodes from different platforms. The mobile nodes scattered across the network need to communicate and exchange messages either directly or through servers. The more dynamic the mobile nodes, the more diffusion or high turnover of nodes leaving and entering different servers or platforms and hence, higher the overhead. This paper proposed an algorithm that indicates and predicts the overhead in different scenarios of grouping of nodes under different servers. On the basis of this prediction and information about the geographical distribution, the nodes can foresee and arrange for resources or the requisites for establishing communication sessions among nodes of different servers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Irshad, A., Shafiq, M., Khurram, S., Gilani, S.M., Irshad, E., Asif, M.S.: An algorithm for strings generation for Regular Expression in a controlled manner. In: IEEE ICIIT, UCP Lhr, ISBN: 978-0-387-25282-7
Irshad, E., Noshairwan, W., Irshad, A., Usman, M., Gilani, M.: Group Mobility in Mobile Ad hoc Networks. In: WWW/Internet, October 13-15, pp. 381–385. IADIS, Germany (2008), ISBN: 978-972-8924-68-3
Buttyan, L., Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, Mobile Network Applications. Special issue on Mobile Ad Hoc Networks, vol. 8(5), pp. 579–592. Kluwer Academic Publishers, Dordrecht (2003)
Akyildiz, I.F., Wang, X., Wang, W.: Wireless Mesh Networks: A Survey. Computer Networks 47(4), 445–487 (2005)
Irshad, A., Noshairwan, W., Shafiq, M., Khurram, S., Usman, M., Irshad, E.: Security Enhancement in MANET Authentication by checking the CRL Status of Servers. In: DEC 2008, SERSC-IJAST, Korea, vol. 1, pp. 91–98. Springer, Heidelberg (2008) ISSN: 2005-4238
The Wi-Fi Alliance. Website, http://www.wi-fi.org/
TheWiMAX Forum, http://www.wimaxforum.org/home
IEEE 802.11 Standard Group Web Site, http://www.ieee802.org/11/
IEEE 802.15 Standard Group Web Site, http://www.ieee802.org/15/
IEEE 802.16 Standard Group Web Site, http://www.ieee802.org/16/
Stajano, F.: Security for Ubiquitous Computing. John Wiley & Sons, Chichester (2002), ISBN 0470844930
Rosen, K.H.: Discrete Mathematics and Its Applications, 6th edn. McGraw-Hill, New York, ISBN 0-07-288008-2, http://highered.mcgraw-hill.com/sites/0072880082/information_center_view0/
http://www.cs.princeton.edu/courses/archive/fall06/cos341/handouts/mathcs.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Irshad, A., Iqbal, M., Ali, A., Shafiq, M. (2011). An Algorithm for Prediction of Overhead Messages in Client-Server Based Wireless Networks. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds) Computational Science and Its Applications - ICCSA 2011. ICCSA 2011. Lecture Notes in Computer Science, vol 6785. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21898-9_35
Download citation
DOI: https://doi.org/10.1007/978-3-642-21898-9_35
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-21897-2
Online ISBN: 978-3-642-21898-9
eBook Packages: Computer ScienceComputer Science (R0)