Energy cost model for frequent item set discovery in unstructured P2P networks
Computer and Information Sciences II
117 - 123
Item Usage Stats
MetadataShow full item record
For large scale distributed systems, designing energy efficient protocols and services has become as significant as considering conventional performance criteria like scalability, reliability, fault-tolerance and security. We consider frequent item set discovery problem in this context. Although it has attracted attention due to its extensive applicability in diverse areas, there is no prior work on energy cost model for such distributed protocols. In this paper, we develop an energy cost model for frequent item set discovery in unstructured P2P networks. To the best of our knowledge, this is the first study that proposes an energy cost model for a generic peer using gossip-based communication. As a case study protocol, we use our gossip-based approach ProFID for frequent item set discovery. After developing the energy cost model, we examine the effect of protocol parameters on energy consumption using our simulation model on PeerSim and compare push-pull method of ProFID with the well-known push-based gossiping approach. Based on the analysis results, we reformulate the upper bound for the peer's energy cost. © 2012 Springer-Verlag London Limited.
KeywordsEnergy cost model
Peer to peer
Distributed computer systems
Peer to peer networks
Cost benefit analysis
Published Version (Please cite this version)https://doi.org/10.1007/978-1-4471-2155-8_14
Showing items related by title, author, creator and subject.
Akar, N. (IEEE, 2013)IEEE 802.3az, also known as Energy Efficient Ethernet (EEE), aims at reducing the energy consumption of an Ethernet link by placing it in sleep mode when the link is idle. Frame coalescing mechanism proposed for EEE is an ...
Akgun, B.; Aykın, Irmak (IEEE, 2013)The clustering algorithms designed for traditional sensor networks have been adapted for energy harvesting sensor networks (EHWSN). However, in these algorithms, the intra-cluster MAC protocols to be used were either not ...