Free Essay

Data Indexing for Heterogeneous Multiple Broadcast Channel

In:

Submitted By yinswork
Words 5335
Pages 22
Data Indexing for Heterogeneous Multiple Broadcast Channel

Andrew Y. Ho

and Dik Lun Lee

Department of Computer Science
The Hong Kong University of Science and Technology
Clear Water Bay, Hong Kong
Email: andrewho@cs.ust.hk, dlee@cs.ust.hk

Abstract

vision in the computing industry – from traditional wired

This paper studies a heterogeneous multiple channel

and stationary desktops to a fast growing area of mobile

environment (HMCE), in which the channels are

computing. The trend of using notebook computers,

controlled by different wireless operators. To the best of

palm-size computers, and personal digital assistants (PDA)

our knowledge, there is no previous research on this

is already in full swing. Furthermore, the enhancement in

scenario. In this paper, we first present the architecture for

reliability, transmission, and speed of wireless links

HMCE which makes use of a centralized index server to

facilitates the mobility of communication. Usually, a

broadcast index information about the broadcast data on a

wireless communication environment consists of two sets

dedicated index channel. An analog can be drawn between

of entities: a large number of users equipped with mobile

HMCE and WWW: the wireless operators are web sites

devices (mobile clients – MCs) and a relatively fewer

and the index channel is Google; Google indexes web

number of stationary mobile service stations (MSS) that

pages so that users can find the web pages they want,

have base stations (BS) or access points (AP) attached to

whereas in HMCE the index channel indexes the data

provide wireless communication in geographical areas

channels to help mobile users to find the data on the air.

known as cells. Unlike a MSS, a MC is able to move freely

We propose three indexing methods to reduce the time and

from cell to cell and poses queries for retrieving data

energy used to search for data in HMCE. Simulation

provided by the MSS.

results are obtained to evaluate the performance of the

There are two major modes for MCs to access information proposed methods.

on

the

wireless

channels:

pull-based

on-demand mode, which collects the queries sent by the
MCs through an uplink channel, and then delivers the

1. Introduction

requested data through the downlink channel; push-based broadcasting mode, which broadcasts data on the broadcast

The

rapid

advance

of

wireless

communication

channel continuously according to some previous data

technologies during the last decade has brought a new

access statistics in order to reduce access latency and

consumption of bandwidth, thus effectively allowing a

become outdated very soon. To find out where the

large number of MCs to access information simultaneously.

expected data will be broadcast, the most straightforward

Furthermore, as receiving messages consumes less power

method for MCs is to search all broadcast channels, but

than sending messages, MCs are able to stay longer with

this is very time consuming and uses up a lot of battery

the

power. Another way is to announce the data indices

limited

power

supplies

in

the

broadcasting

environment.

through a dedicated index channel so that MCs can

Because of business, economic and technical reasons,

identify where the data will be broadcast. In HMCE, we

some service providers may want to use multiple

propose to makes use of a centralized index server to

low-bandwidth channels to achieve high combined

broadcast index information about the broadcast data on a

bandwidth instead of getting a single high-bandwidth

dedicated index channel. Mobile clients listen to the index

channel. In this homogeneous multi-channel environment,

channel and then tune into the data channel according to

the server has full control over all channels in terms of

the index information and scan for the data it wants. In

scheduling data on the channels and will most likely use a

other words, the index server/channel is the “Google” of

fixed indexing and scheduling scheme. A mobile client

the data on the air.

typically subscribes to one or a few wireless operators and

Researchers

have

proposed

different

broadcast

as such it is easy to identify the available channels and

scheduling [1, 2, 3] and indexing schemes [4, 5, 6] in order

scan them to pick out the interesting information.

to reduce power consumption for a single broadcast

In this paper, we study a heterogeneous multiple

channel. Yet, scheduling and indexing methods used in a

channel environment (HMCE), which, in contrast,

single channel broadcast may not be directly applied to a

consists of a large number of wireless operators ranging

multi-channel environment. There are also studies on

from phone companies to amateurs operating in public

multiple channel scheduling and indexing [3, 4, 7] that

radio frequency bands (e.g., Starbucks) [9]. The wireless

focus on a homogeneous multiple channel environment. To

operators disseminate information on channels that are not

the best of our knowledge, there is no previous research on

related or unorganized. An analog can be drawn between

the HMCE scenario.

HMCE and WWW. In HMCE, the data channels are the web sites and the broadcast data are the web pages.

In this paper, the architecture of HMCE is proposed.
We introduce indexing methods to reduce the time and

As information is disseminated through different

energy used to search for data on multiple data channels.

service providers on different wireless broadcast channels,

Three indexing models are described. Simulation results

it is difficult for mobile users to identify the available

are obtained to evaluate the performance of the three

channels (cf. web sites), let alone those containing the data

proposed methods.

they want (cf. web pages). They need to have knowledge

The rest of this paper is organized as follows. Section

about what channels are available and which channels

2 introduces the background and related work on wireless

carry their requested data. Since the broadcast pattern may

broadcast. Section 3 describes the proposed methods for

change dynamically over time, any static channel

data indexing. Section 4 evaluates the performance of the

information pre-programmed in the mobile devices may

proposed methods. Section 5 concludes the paper.

2. Background

that concerned the conflict of data pages. The page-based strategy (PB) aims at allocating the data pages by their

In single channel environment, one way of reducing

own access frequencies. The request-based strategy (RB)

power consumption is by selective tuning [6, 5], which

is based on user requests rather than pages. The

enables MCs to switch into active mode (power consuming)

conflict-free version (CFV) of the RB further enhances the

only when the expected data is being broadcast. A server is

schedule by checking if the pages in the same request are

required to broadcast indexing information to make

assigned in the same time slot.

selective tuning works.
The (1, m) indexing scheme [6, 5] is an index allocation method that involves the complete index being

3. Data

Dissemination

in

Heterogeneous

Multiple Channel Environments

broadcast m times in a broadcast cycle. MC traverses the index buckets and determine the offset to the requested data bucket. The tree-based indexing scheme [6, 5] was

Three indexing schemes in the centralized model for data dissemination in a HMCE are proposed.

introduced in which an index is only partially replicated in the broadcast cycle. In this scheme, the data file is associated with

a

B+-tree

index

structure.

3.1. Basic Model

The

signature-based indexing scheme was proposed [8] for

The key point in the centralized model is the central

real-time information filtering. Basically, to access

index server (CIS), which is used to manage and broadcast

information, a query signature is constructed and

index information about the data being broadcast on all of

compared with the broadcast signature. If the signatures

the broadcasting channels. In the architecture, we define

match, all records indexed by the signature will be read

the broadcast agent (BA) as any individual that has data to

until checked for correctness or until the expected record is

be broadcast on the broadcast channel.

found in the information frame.
Scheduling and indexing methods used in single channel broadcast may not be directly applied to a multiple channel environment. New algorithms and modified methods were thus proposed, although the algorithms did not address certain issues related to a HMCE. In [3],
Hameed and Vaidya integrated the online algorithm with alternate labeling by assigning instances of the data item

Figure 1. Centralized HMCE

from a single channel schedule into a multiple channel

Each BA is connected to the CIS and CO through a

schedule. In [4], Hsu et al. suggested a method for

wired network (see Figure 1). The CIS is responsible for

indexing and scheduling a multiple channel broadcast that

broadcasting index information on a dedicated wireless

considered data access frequencies based on distributed

channel for the whole HMCE, while the CO is only

indexing [5]. In [7] Ke et al. proposed a scheduling method

responsible for broadcasting a data message (DM) on its

providing the data are sent at or after the EST.

own wireless channels for BAs who subscribe to it.
Assume that a BA has data to be broadcast. The first

Once the BA receives an EST from the index server, it

thing for it to do is to send a “data-to-send” notification

will wait until the indicated time. At that moment, the BA

(DTS) to the CIS through the wired network (Figure 1).

can send its data to the service provider – the CO (Figure

The content of the DTS follows a standard format as

1). Whether the CO broadcasts the BA’s data immediately

defined by the CIS, which includes the BA’s identification,

or appends it to an internal broadcast queue depends on the

the channel ID that the BA has subscribed to, the message

traffic of the channel.

identification, and a list of key attributes describing the

Whenever the MC wants to retrieve data from the

data. When the CIS receives the DTS, it extracts the

wireless channel, it will tune into the index channel and

information from the DTS and converts it into the index

filter all broadcast IMs by listening to the channel until it

message (IM) format, which contains a header with the

finds an IM containing the attribute that matches its

BA’s ID, the channel ID, the message ID, the IM size, the

request. Then the MC can tune into the data channel

number of attributes, and a pointer to the starting of

indicated by the IM header and wait for the requested data

attributes. Next, the CIS puts the IM into the broadcast

to be broadcast. Since each IM header contains the

queue for index broadcast.

corresponding IDs of the BA and the message, the MC

Once the CIS receives the DTS, it is required to reply to

only needs to check both IDs in the DM in order to

the BA at the earliest time that it can broadcast its data

determine if the DM is the one indicated by the IM.

(Figure

the

Otherwise, the MC can doze off until the end of the

“earliest-send-time” notification (EST). The value of the

incorrect DM. The MC may also end the retrieval process

EST is equal to the broadcast end time of the BA’s IM. The

if no attribute in IMs can be found matching its request

EST is very important for serializing the IM and the

within a certain period of time.

1).

The

replied

message

is

called

indexed data in the centralized model. Suppose it is omitted and a BA broadcasts its data a short while after it

3.2. Signature Model

has sent the DTS to the CIS. If there are a lot of IMs queued up in the CIS, it will take a long time for the CIS to

The environment of a signature model is the same as

broadcast all of them. Therefore, there is a chance that the

the environment used in the basic model. The major

BA broadcasts its data before the CIS has broadcast the

difference concerns how indices are constructed. In the

corresponding IM. In this case, the data being broadcast by

basic model, whenever the CIS receives a DTS sent by BAs,

the BA are not properly indexed, and the corresponding IM

all attributes in the attribute list attached to the DTS will be

broadcast by the CIS will be invalid. For data retrieval, if

used to construct the IM. Also, each IM is only responsible

an MC has read this IM and tuned into the specified data

for one DM. If there are a lot of BAs and all of them are

channel, then it will wait forever or terminate after a

sending a DTS with a long attribute list, then it will take a

timeout period, since the data have already gone on that

long period of time for the CIS to broadcast all the IMs on

channel. With the EST replied by the CIS to the BA, they

the index channel. Since the EST is equal to the end time

can ensure that the data will have an index to indicate,

of the corresponding broadcast IM, the BAs also need to

wait for a long period of time to start sending the data to the COs.

In the signature model, indices are only signatures that guide the MCs to the data channel where the requested

In the signature model, to reduce the size of the IM,

data may be found. As a result, the BAs are required to

signatures are used instead of real attributes. An attribute

send with each data item an AL to their CO for broadcast,

list signature (ALS) is formed by hashing each attribute in

such that the MCs can check whether the query attribute is

an attribute list (AL) into a random bit string, and then

actually in the AL attached to the broadcast data.

superimposing all bit strings together (Figure 2).

A false drop can result from a signature comparison.
This happens when an MC finds a matching CS with the query signature, but in fact, the corresponding channel does not contain the requested data item. If this is the case, the MC needs to leave the data channel and tune back into the index channel to filter other CSs. To determine the occurrence of a false drop, a timeout for searching the data

Figure 2. Generation of attribute list signature

channel is required. Since the MC tunes into the indicated

During the filtering process, a query signature is

data channel after finding a matched CS and waits for the

constructed in the same way as the ALS. Then the query

data message, if the length of the searching period is not

signature will be compared with the ALS using the logical

specified and if the CS is in fact a false drop, then the MC

AND operation to find if the query is potentially in the AL.

will wait forever on the data channel without finding any

The CIS maintains two lists for managing signatures: a

useful data.

channel signature (CS) list for storing all CSs with one entry assigned to only one data channel in the system, and

3.3. Signature Model with Operator’s Feedback

an order-array for storing the broadcast order and time for each entry in the CS list. Upon reception of the DTS from a

An improper length for the searching period can

BA, the CIS extracts the channel ID and the ALS from it.

lengthen the retrieval time. No matter how carefully

Then the ALS is superimposed onto the channel signature

chosen is the length of the searching period, there is still

(CS) of the referring channel. The main purpose of the

the possibility of an incident of determining an ‘incorrect

order-array is to keep track of the broadcast time for each

false drop’. An incorrect false drop happens when the MC

non-empty CS (since it is not necessary to broadcast an

finds a matching CS on the index channel but cannot find

empty CS for indexing purposes). Thus, the CIS can

the correct DM within the searching period on the

respond to the BA with the EST according to which

corresponding data channel. In fact, the DM is broadcast

channel it uses. During signature broadcast, the CIS goes

on the indicated data channel, but after the MC’s expiration

through each non-empty entry in the order-array and only

time. Incorrect false drops occur more frequently when the

those CSs in the array will be broadcast. Moreover, after

searching period is too short, or the traffic load of the data

broadcasting, all CSs and the corresponding order-array

channel is heavy, since in both cases, the correct DM

entries will be cleared for future superimpositions.

cannot be broadcast within the MC’s searching period.

To eliminate the effect of incorrect false drops, at least

period. The reason for this is straightforward: as the MC is

one CS needs to be broadcast within the length of a

still searching for the correct attribute on the data channel

searching period before the corresponding DM has been

during the searching period, if the re-sent signature is

broadcast. Hence, when the MC reads the CS and switches

broadcast within this period, it will be gone before the MC

to the data channel, the DM will arrive during the

switches back to the index channel. The purpose of the

searching period. In order to accomplish this method,

re-sent ALS is only to prevent an incorrect false drop.

cooperation from all the COs is needed.

Since the corresponding data is already in the CO’s internal broadcast queue, the second reply of the EST is not required by the BA. The message flow in the feedback model is shown in Figure 3. For the MC, the same procedure for data retrieval is used, but when an incorrect false drop occurs and the MC switches back to the index channel after timeout, the MC can use the re-sent signature on the index channel and switch back to the data channel to retrieve the DM.

Figure 3. Signature Model with Operator’s feedback
In both the basic and signature models, once the BA

4. Performance Evaluation

receives an EST, it waits until the specified time to send the data. But the BA has no idea about the time that the

This section evaluates the performance of the three

data message will be broadcast on the data channel by its

proposed heterogeneous multiple channels broadcast

CO. As a result, the BA has no way of ensuring that at least

models by using simulation. The primary performance

one CS containing the ALS of the data will be broadcast

metric used for evaluating the models for MC is average

within the searching period prior to the broadcast of the

access time.

data. Feedback from the CO plays an important role in

For all experiments, CSIM18 [10] was used for

notifying the BA about the time for the data broadcast. In

implementing the simulation and the same parameters

contrast to the signature model, where the CO receives the

were used in the simulation environment. Besides, we

data from the BA, besides appending the data to the

assume that the capacities of the wired networks are much

broadcast queue, it also gives feedback to the BA who

larger than the wireless broadcast channel (1 byte/unit of

requested the data broadcast about the time that the DM

time), therefore the notification messages, such as DTS and

will be broadcast on the channel. After getting the

EST, and any data going through it does not affect the

feedback from the CO, if the difference between the CS

performance of the system. As a result, time spends on

end time and the data broadcast time is more than one

wired networks is not counted. For attribute used in the

searching period, then the BA can send the same ALS again

simulation, a vocabulary is made, and each time, BA can

to the CIS one searching period prior to the broadcast time

choose 1 to 25 words from the vocabulary as the data

of the data, while avoiding any overlap with the searching

attributes. Similarly, MC chooses one word from the list

for its query attribute. The length for each index message

experiments, while the signature model has slightly higher

in the basic model is added up by the size of the attributes

values due to the longest time for retrieving data. As the

plus a 3 bytes header - BA ID, message ID and size of the

number of channels increases, MC access time in all

message, which ranges from 9 bytes to 153 bytes in total.

models tends to reach the same values and stay unchanged

For the signature models, 128-bit (16 bytes) signature is

regardless of further increases in the number of channels.

used for each channel. The size of data which BA sends to

The reasons are as follows. First of all, the time that CO

CO is ranging from 10 to 10000 bytes. For basic model, 2

receives a data message and the time that CO broadcast the

bytes IDs for verification is added, while in the signature

data message are getting closer. As EST is also the end

models, size of attributes is added.

time of the index broadcast, MC access time can be roughly formulated as the summation of the time spent on

4.1. Impact of the number of channels on MC’s data access

filtering on index channel, the data queuing time, and the time for broadcasting data message. Since the average data sizes in both models are the same, the filtering time

MC access time measures the time elapsed from the

becomes the main factor influencing the access time.

moment the MC poses a request and starts listening on the

7000
6000

received. The performance on MC access time is

5000

15

19

17

15

13

11

0

9

20

1000

7

Basic Model
Signature Model
Feedback Model

25

Basic Model
Signature Models

2000

5

Unit of Time (x 105)

30

3000

3

result is shown in Figure 4.

4000

1

investigated with respect to the number of channels. The

Unit of Time

wireless channels to the moment the requested data is

Number of Channels

10

Figure 5. MC on index channels

5

Figure 5 shows the time that MC has spent on the index
19

17

15

13

9

11

7

5

3

1

0
Number of Channels

Figure 4. MC access time
In the figure, MC access time decreases as the number of channels increases. This is because workload on each

channel. The graph clearly shows that MC spends longer time in the basic model than in the signature models, due to the difference in index size. As a result, MC access time in the basic model obtains higher values in the experiments. channel is reduced by using a larger number of channels, thus enabling each data broadcast to start earlier. The

4.2. Impact of the searching period

figure also shows that MC access time in the feedback model achieves the lowest values at the beginning of the

Figure 6 shows the MC access time with respect to

different length of searching period in signature model and

data message on the data channel. Therefore, MC in the

feedback model. Figure 7 shows the number of false drops

feedback model incurs less access time than in the

with respect to the same searching period.

signature model. As the length of the searching period increases, the number of false drops decreases since MC is

25

Unit of Time (x104)

able to eliminate incorrect false drops. This also explains
20

why the access time for both models tends to overlap with each other by increasing the searching period.

15
10

4.3. Impact of M-size

Signature Model
Feedback Model
Basic Model

5

The number of false drops can influence the MC access

0
0

10

20

30

40

50

60

70

80

90

100

time, but false drop itself is also influenced by the m-size.

Search Period (x103 Unit of Time)

The m-size for a signature stands for the number of 1’s
Figure 6. Access time

generated by the signature generator (usually hash function). If the m-size is too small, then too many 0’s will be in the signature, resulting in under utilized signatures. If

Signature Model
Feedback Model

50

the m-size is too high, then there will be too many 1’s in

40

the signatures, resulting in weakened filtering capabilities.
30

This is because signatures with many 1’s are much easier

20

to match a query signature by chance. Figure 8 shows the

10

number of false drops against m-size.
100

Search Period (x103 Unit of Time)

Figure 7. False drops
As shown in the figures, a short searching period causes a lot of false drops, since MC does not have enough time to reach the correct data message before the end of the searching period. Therefore, they interpret all the missed data as false drops. In the feedback model, since
ALS of the data will be resent to CIS for broadcast again on

20
18
16
14
12
10
8
6
4
2
0

Signature Model
Feedback Model

12
0

90

11
0

80

90
10
0

70

80

60

70

50

60

40

50

30

30

20

10

10

Number of false drop

0

40

0

20

Number of False Drops

60

M-size

Figure 8. False drops Vs M-size

the index channel, MC is able to retrieve the CS the second

The figure shows that by using signatures with m-size

time. Moreover, as the resent of ALS is within one

equal to 20 bits, the lowest false drop rate can be obtained.

searching period prior to the real data broadcast, once MC

Ideally, m-size with half signature size (64 bits in this case)

gets the resent CS, it is most likely that it will receive the

will be the best, since the largest number of bit pattern for

a bit stream is constructed with same numbers of 1’s and

models achieves low and similar access time. In addition,

0’s (nCn/2), thus reducing the chance of collision.

as channel loading increases, the number of data

However, in the proposed models, each CS is in fact a

broadcasts also increases. Thus, CO’s broadcast queue will

superimposition of multiple ALSs from different BAs, and

be filled with awaiting data messages, which also increase

each ALS is in turn generated from a different number of

MC access time by delaying broadcast of the requested

attributes and thus contains different number of 1’s. This

data. The fact that the feedback model has the lowest

explains why the minimum m-size is different from the

access time is the result of the feedback mechanism with

theoretical result, which assumes uniformity in the ALSs.

signature resent.

In a real operational environment, it is difficult to predict

In addition, when loading increases, the differences in

the optimal m-size, because a change in system loading

MC access time between the basic and signature models

can change the optimal m-size.

also increase, which is basically caused by the lengthy AL attached to each IM. In the basic model, the number of

4.4. Impact of system loading on MC access time

BA’s requests is directly related to the number of IMs. If there are 300 BA’s requests, there will be 300 ALs

System loading is defined as the fraction that the

broadcasted on the index channel. Suppose MC’s query

broadcast channels are occupied for broadcasting data

attribute is in the last BA’s request, it is required to scan

messages. In the experiment, the loading is increased by

through all 300 IMs before switching to the data channel,

adding agents to the system in order to increase the usage

which is time consuming compared to the signature

of each data channel. The maximum value ‘1’ means that

models. Although ALs exist in the signature models, the

all channels are occupied at any instance during the

number of ALs that MC has to process is reduced since

simulation.

each channel holds only a fraction of all ALs. MC is only

Unit of Time (x105)

3.5
3

required to filter the ALs that exist on the data channel.
Basic Model
Signature Model
Feedback Model

Therefore, the difference in access time increases as loading increases.

2.5
2

5. Conclusion and Future Work

1.5

In this paper, we propose an HMCE architecture

1
0.125 0.25 0.375 0.5 0.625 0.75 0.875

1

System Loading

consisting of independent wireless channel operators, broadcast agents and a centralized index server. Compared

Figure 9. MC access time Vs System loading

to the existing data dissemination schemes for a

Figure 9 shows MC access time with respect to

multi-channel environment, HMCE provides a channel

different system loading. With light channel loading, fewer

through which MCs are able to know where to fetch their

data will be sent. Hence, the number of false drops is

desired data. Furthermore, three indexing methods

reduced. As a result, MC in the signature and feedback

applicable to the HMCE architecture were proposed,

(MOBICOM97). Budapest. September 1997.

namely the basic model, the signature model, and the signature model

with

channel

operator’s

feedback

[4]

C.H. Hsu, G. Lee, and A.L.P. Chen, “Index and data allocation on multiple broadcast channels considering data access frequencies,” in Proceedings of the 3rd
International Conference on Mobile Data Management
(MDM2002), pp. 87-93. January 2002.

[5]

T. Imielinski, S. Viswanathan, and B.R. Badrinath,
“Energy efficiency indexing on air,” in Proceedings of the
ACM Conference on Management of Data (SIGMOD94), pp. 25-36. May 1994.

[6]

T. Imielinski, S. Viswanathan, and B.R. Badrinath, “Data on air: Organization and access,” IEEE Transactions on
Knowledge and Data Engineering, 9(3). May/June 1997.

[7]

C.H. Ke, C. Lee, and C.C. Chen, “Broadcast scheduling for multiple channels in wireless information systems,” in
Proceedings of National Computer Symposium (NCS99), pp. 525-532. Taipei, Taiwan. December 1999.

[8]

W.C. Lee and D.L. Lee, “Signature caching techniques for information broadcast and filtering in mobile environments,” ACM/Baltzer Journal of Wireless
Networking (WINET), 5(1), 57-67. 1999.

[9]

A.Y. Ho, “Data indexing in heterogeneous multiple broadcast channels,” M.Phil. Dissertation, Department of
Computer Science, Hong Kong Unviersity of Science
Technology, Hong Kong, HKSAR, 2003.

[10]

CSIM18, Mesquite Software Inc.

(feedback model). The basic model mainly uses data attributes from broadcast agents to form index messages.
The signature model superimposes attribute list signatures for the purpose of indexing. Finally, the signature model with channel operator’s feedback is an enhancement of the signature model for reducing the effect of incorrect false drops. We showed the both the signature model and feedback model are significantly better than the basic model. Our work on HMCE represents the first attempt, to the best of our knowledge, to address a heterogeneous, autonomous broadcast environment. Much more research needs to be done to investigate different architectures (e.g.,
COs and CIS can directly communicate in scheduling the index and data broadcast [9]) and other index schemes.

Acknowledgment
This work was supported in part by grants from the
Research Grant Council of Hong Kong (Grant No.
HKUST 6179/03E).

References
[1]

S. Acharya, R. Alonso, M. Franklin, and S. Zdonik,
“Broadcast disks: Data management for asymmetric communication environments,” in Proceedings of the
ACM Conference on Management of Data (SIGMOD95), pp. 199-210. San Jose, California. May 1995.

[2]

V. Gondhalekar, R. Jain, and J. Werth, “Scheduling on airdisks: Efficient access to personalized information services via periodic wireless data broadcast,” in IEEE
International Conference on Communications (ICC 97), vol. 3, pp. 1276-1280. Montreal. 1997.

[3]

S. Hameed and N.H. Vaidya, “Log-time algorithm for scheduling single and multiple channel data broadcast,” in
Proceedings of the 3rd Annual ACM/IEEE International
Conference on Mobile Computing and Networking

Similar Documents

Premium Essay

Internet

...Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia Europe Direct is a service to help you find answers to your questions about the European Union New freephone number * 00 800 6 7 8 9 10 11 Certain mobile telephone operators do not allow access to 00800 numbers or these calls may be billed. In certain cases, these calls may be chargeable from telephone boxes or hotels. «The views expressed are those of the authors and not necessarily those of the European Commission or any of its officials» A great deal of additional information on the European Union is available on the Internet. It can be accessed through the Europa server (http://www.europa.eu). Cataloguing data can be found at the end of this publication. ISBN 978-92-79-08008-1 © European Communities, 2008 Reproduction is authorised provided the source is acknowledged. Printed in Belgium PRINTED ON CHLORE FREE PAPER The Future of the Internet A Compendium of European Projects on ICT Research Supported by the EU 7th Framework Programme for RTD European Commission I nform ati on S oc i et y and M ed ia ••• 2 Preface 5 priorities identified by the Internet Governance Forum: openness, security, access, diversity and critical Internet resources. The use of the Internet in public policies will considerably grow in areas such as education, culture, health and e-government. These topics will be at the core of our contribution to the OECD...

Words: 66329 - Pages: 266

Premium Essay

Databasse Management

...Fundamentals of Database Systems Preface....................................................................................................................................................12 Contents of This Edition.....................................................................................................................13 Guidelines for Using This Book.........................................................................................................14 Acknowledgments ..............................................................................................................................15 Contents of This Edition.........................................................................................................................17 Guidelines for Using This Book.............................................................................................................19 Acknowledgments ..................................................................................................................................21 About the Authors ..................................................................................................................................22 Part 1: Basic Concepts............................................................................................................................23 Chapter 1: Databases and Database Users..........................................................................................23 ...

Words: 229471 - Pages: 918

Free Essay

Technical Questions

...Questions Table of Contents Data Structures Aptitude ............................................................................. 3 C Aptitude .................................................................................................. 12 C++ Aptitude and OOPS ............................................................................ 75 Quantitative Aptitude............................................................................... 104 UNIX Concepts ......................................................................................... 121 RDBMS Concepts ..................................................................................... 135 SQL .......................................................................................................... 153 Computer Networks ................................................................................. 161 Operating Systems .................................................................................. 169 2 Copyright©: Vyom Network (http://www.vyomworld.com) - All Rights Reserved Technical Aptitude Questions Data Structures Aptitude Data Structures Aptitude 1. What is data structure? A data structure is a way of organizing data that considers not only the items stored, but also their relationship to each other. Advance knowledge about the relationship between data items allows designing of efficient algorithms for the manipulation of data. 2. List out the areas in which data structures are applied extensively...

Words: 31949 - Pages: 128

Premium Essay

Internet Ages

...CHAPTER – 1 INTRODUCTION TO INTERNET WHAT IS A NETWORK? [pic] A network is a group of computers that are able to communicate with one another and share data, files, programs, and operations. The computers in a network are connected via hardware and software. The hardware is what physically connects the computers in the network together. For example: telephone lines, fibre-optic cables, routers and gateways, and the computers themselves. The software is what enables us to use the hardware for communication and exchanging information. Just as your brain tells your body parts how to function and work together, the software governs the way computers in the network communicate with each other and perform functions. Software that enables networking follows a set of rules that are generally referred to as protocol. Networks can be interoperable. This means that different types of computers, using different operating systems, can be connected, communicate with each other, and share information - as long as they follow the network protocols. [pic] In Summary: A network is a group of two or more computers, connected together through a physical infrastructure, that are able to communicate and exchange information because they agree to use software that observes the same set of rules, or protocol. WHAT IS THE INTERNET? • A network of networks • Based on TCP/IP (Transmission Control Protocol/Internet Protocol) • Global • A variety of services and...

Words: 48401 - Pages: 194

Premium Essay

Kjjk

...*** (A) IMPORTANCE OF MARKETING Marketing is a very important aspect in business since it contributes greatly to the success of the organization. Production and distribution depend largely on marketing. Marketing covers advertising, promotions, public relations, and sales. Since the goal of marketing is to make the product or service widely known and recognized to the market, marketers must be creative in their marketing activities. In this competitive nature of many businesses, getting the product noticed is not that easy. Strategically, the business must be centered on the customers more than the products. Although good and quality products are also essential, the buying public still has their personal preferences. If you target more of their needs, they will come back again and again and even bring along recruits. If you push more on the product and disregard their wants and the benefits they can get, you will lose your customers in no time. The sad thing is that getting them back is the hardest part. 1. Marketing Promotes Product Awareness to the Public Getting the product or service recognized by the market is the primary goal of marketing. No business possibly ever thought of just letting the people find out about the business themselves, unless you have already established a reputation in the industry. But if you are a start-out company, the only means to be made known is to advertise and promote but the important thing is that product and company information is...

Words: 43638 - Pages: 175

Premium Essay

Database

...This page intentionally left blank Copyright © 2009, New Age International (P) Ltd., Publishers Published by New Age International (P) Ltd., Publishers All rights reserved. No part of this ebook may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the publisher. All inquiries should be emailed to rights@newagepublishers.com ISBN (13) : 978-81-224-2861-2 PUBLISHING FOR ONE WORLD NEW AGE INTERNATIONAL (P) LIMITED, PUBLISHERS 4835/24, Ansari Road, Daryaganj, New Delhi - 110002 Visit us at www.newagepublishers.com Preface In recent years there have been significant advances in the development of high performance personal computer and networks. There is now an identifiable trend in industry toward downsizing that is replacing expensive mainframe computers with more cost-effective networks of personal computer that achieve the same or even better results. This trend has given rise to the architecture of the Client/Server Computing. The term Client/Server was first used in the 1980s in reference to personal computers on a network. The actual Client/Server model started gaining acceptance in the late 1980s. The term Client/Server is used to describe a computing model for the development of computerized systems. This model is based on the distribution of functions between two types of independent and autonomous entities:...

Words: 79055 - Pages: 317

Premium Essay

E-Book Supply Chain Management

...Introduction to Supply Chain Management Technologies Second Edition Introduction to Supply Chain Management Technologies Second Edition David Frederick Ross CRC Press Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2011 by Taylor and Francis Group, LLC CRC Press is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4398-3753-5 (Ebook-PDF) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval...

Words: 158845 - Pages: 636

Premium Essay

Erp Integration Scm, Crm

...Integrating ERP, CRM, Supply Chain Management, and Smart Materials Dimitris N. Chorafas AUERBACH Library of Congress Cataloging-in-Publication Data Chorafas, Dimitris N. Integrating ERP, CRM, supply chain management, and smart materials / Dimitris N. Chorafas. p. cm. Includes bibliographical references and index. ISBN 0-8493-1076-8 (alk. paper) 1. Business logistics. 2. Customer relations. I. Title. HD38.5 .C44 2001 658.5—dc21 2001022227 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The consent of CRC Press LLC does not extend to copying for general distribution, for promotion, for creating new works, or for resale. Specific permission must be obtained in writing from CRC Press LLC for such copying. Direct all inquiries to CRC Press LLC, 2000 N.W. Corporate Blvd., Boca Raton, Florida 33431. Trademark Notice: Product or corporate names may be trademarks...

Words: 145509 - Pages: 583

Premium Essay

Database Management System

...DATABASE S YSTEMS DESIGN, IMPLEMENTATION, AND MANAGEMENT CARLOS CORONEL • STEVEN MORRIS • PETER ROB Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Copyright 2010 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Database Systems: Design, Implementation, and Management, Ninth Edition Carlos Coronel, Steven Morris, and Peter Rob Vice President of Editorial, Business: Jack W. Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick, Jr. Senior Product Manager: Kate Mason Development Editor: Deb Kaufmann Editorial Assistant: Nora Heink Senior Marketing Communications Manager: Libby Shipp Marketing Coordinator: Suellen Ruttkay Content Product Manager: Matthew Hutchinson Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Media Editor: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Andrea Schein Proofreader: Foxxe Editorial Indexer: Elizabeth Cunningham Composition: GEX Publishing Services © 2011 Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted...

Words: 189848 - Pages: 760

Premium Essay

Six Sigma

...Environment; Factors Influencing Consumer Buyer Behavior; Buyer Decision Process; Inputs for Buying Decision Process; Consumer Trends; Market Segmentation Process. Developing Market Strategies and the Offerings Part –I Positioning and Differentiation: Concept, Positioning according to Ries and Trout, Various Tools of Differentiation; Product Decisions and Strategies; Product Mix; Product Life Cycle; Brand Positioning; Brand Identity; Equity and Packaging. Developing Market Strategies and the Offerings - Part II: Introduction to Service Marketing; Differentiating Services; Product and Service Price; Response to Change in Price; Pricing Strategies. Delivering Marketing Programs – Part I Marketing through Channel Partners; Wholesalers and Retailers: Current Trend; Channel Management. Delivering Marketing Programs – Part II Market Communication, Process for Effective Communication; Advertising; Different Advertising Media; Sales Promotion; Public Relations; Direct Marketing; Personal Selling: Concepts and Process; Management of Sales Force Suggested Reading: 1. Marketing Management by Kotler Philip; Publisher: Prentice-Hall of India 2. Marketing Management by Ramaswamy V S and Namakumari; Publisher: S Macmillan India Ltd. 3. Marketing Management by Saxena Rajan; Publisher: Tata McGraw-Hill 4. Marketing in India Cases and Readings by Neelamegham S; Publisher: Vikas...

Words: 96487 - Pages: 386

Premium Essay

Marketing Channel Distribution

...Marketing Channel Strategy This page intentionally left blank Eighth Edition Marketing Channel Strategy Robert W. Palmatier University of Washington’s Foster School of Business Louis W. Stern Northwestern University’s Kellogg School of Management Adel I. El-Ansary University of North Florida’s Coggin College of Business Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Editor in Chief: Stephanie Wall Acquisitions Editor: Mark Gaffney Program Manager Team Lead: Ashley Santora Program Manager: Jennifer M. Collins Director of Marketing: Maggie Moylen Executive Marketing Manager: Anne Fahlgren Project Manager Team Lead: Judy Leale Project Manager: Thomas Benfatti Operations Specialist: Nancy Maneri Cover Designer: Suzanne Behnke Creative Director: Jayne Conte Digital Production Project Manager: Lisa Rinaldi Full Service Vendor: Integra Software Services Pvt. Ltd. Full Service Project Manager: Anandakrishnan Natarajan/Integra Software Services Printer/Binder: Courier/Westford Cover Printer: Lehigh-Phoenix Text Font: 10/12, ITC Garamond Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text (or on page xix). Copyright © 2015 Pearson Education, Inc., publishing as Prentice...

Words: 236095 - Pages: 945

Free Essay

Capstone

...WeMakeConnections TTI Multi Campus Network Executive Summary: WeMakeConnections is an up-and-coming networking and infrastructure company; we offer network solutions that are customized to each client, and their specific financial and technical needs. We provide a le82vel of service you would expect from a close friend, not a company. We service all network sizes, large and small, and have worked extensively with existing network upgrades, as well as total network creation. WeMakeConnections offers personalized services to match any budget. In this day and age competition is fierce, and money is tight. That is why we only hire people who love networking; they know what works, what doesn't, and where we can cut waste. That is why WeMakeConnections is the only company that offers a complimentary follow up, one month after your network is complete. We want to make sure you love your network. Each of our eight core employee's graduated from the prestigious ITT Tech, San Diego. Each has a passion for networking, and genuine love for problem solving. From the cabling in the walls to workstations on the desks, a trained professional will be on the job. Based on the request for proposal from TTI, we have created what may be, our masterpiece work. The following pages detail our plan of action for TTI's success, and subsequent expansions. We are confident that our network provides the best return on investment for TTI's four additional campuses, and will be easily scaled to...

Words: 18593 - Pages: 75

Free Essay

Rererer

...Oracle DBA Interview Questions and Answers Compiled By Mohamed Fowjil Abdul Hameed Contents Oracle DBA Interviews - Overview 2 Oracle DBA Interview Questions and Answers – ARCHITECTURE 4 SENIOR ORACLE DBA INTERVIEW QUESTIONS 31 MID LEVEL ORACLE DBA INTERVIEW QUESTIONS 57 Oracle 11g Database New Features Interview Questions and Answers 65 Oracle RAC Interview Questions and Answers 70 Oracle RAC Interview Questions (10g) Questions and Answers 137 Oracle Data Guard Interview Questions and Answers 168 Oracle ASM Interview Questions and Answers 205 Oracle Patching,Cloning and Upgrade Interview Questions and Answers 219 Oracle Backup and Recovery Interview Questions and Answers 228 Oracle RMAN Interview Questions and Answers 232 Oracle Performance Tuning Interview Questions and Answers 237 Oracle Performance Tuning Interview Questions and Answers 245 Oracle Export/Import (exp/imp)- Data Pump (expdp/imp) Interview Questions and Answers 249 UNIX Interview Questions and Answers for Oracle DBAs 254 Oracle DBA Interviews - Overview Dear Readers, Hereby, I am sharing my experience of interviews asd technical discussion with various MNC Dba’s, Project managers and Project delivery managers and Technical architects, as part of my interview preparation, I used to refer my own work note as well as web sources below details are a consolidate form of my interview preparation and Oracle dba interviews questions and answers General Guide line:...

Words: 97621 - Pages: 391

Premium Essay

Marketing Management 14th Edition Test Bank Kotler Test Bank

...but has no impact on a firm's intangible assets. D) It is more important for bigger organizations than smaller ones. E) It is seldom used by nonprofit organizations. Answer: B Page Ref: 4 Objective: 1 Difficulty: Easy 2) ________ is the art and science of choosing target markets and getting, keeping, and growing customers through creating, delivering, and communicating superior customer value. A) Marketing management B) Knowledge management C) Operations management D) Strategic management E) Distribution management Answer: A Page Ref: 5 Objective: 2 Difficulty: Easy 3) Identify the correct statement about marketing management. A) It is primarily concerned with the systematic gathering, recording, and analysis of data about issues related to marketing products and services. B) It focuses mostly on monitoring the profitability of a company's products and services. C) It focuses solely on attaining an organization's sales goals in an efficient manner. D) It is defined as the field that deals with planning and managing a business at the highest level of corporate hierarchy. E) It occurs when at least one party to a potential exchange thinks about the means of achieving desired responses from other parties. Answer: E Page Ref: 5 Objective: 2 Difficulty: Moderate 4) A social definition of marketing says ________. A) effective marketing requires companies to remove intermediaries to achieve a closer connection with direct consumers B) a company...

Words: 173926 - Pages: 696

Free Essay

Linux

...Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at http://www.opencontent.org/openpub/). Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Abstract This document is a record of all package changes since the last minor update of Red Hat Enterprise Linux 5 1. Added Packages ................................................................................................................... 1 2. Dropped Packages .............................................................................................................. 19 3. Updated Packages ............................................................................................................... 20 1. Added Packages cmirror-1.1.36-1.el5 • Group: System Environment/Base • Summary: cmirror - The Cluster Mirror Package • Description: cmirror - Cluster Mirroring 1 Release Manifest cmirror-kmod-0.1.21-10.el5 • Group: System...

Words: 32183 - Pages: 129