PRED-ACK Proprietary For Reduced Traffic: Lathika.K, Devi.N, Mrs.E.Saraswath
PRED-ACK Proprietary For Reduced Traffic: Lathika.K, Devi.N, Mrs.E.Saraswath
PRED-ACK Proprietary For Reduced Traffic: Lathika.K, Devi.N, Mrs.E.Saraswath
ABSTRACT
In this paper, we present the process between two or more networks for a reduced traffic system. It is mainly used
for networking users. The PRED-ACK is used effectively for the transmission of data’s. Here the unwanted strings
are removed, hence providing strong network and bandwidth. The client compares newly received data with the
previously received data. When there is no comparison the operation continues with no PRED-ACK. It is very
useful to spread the maintenance of cloud elasticity. The main advantage of using this method is it will be highly
useful for recent technology cloud users. It works on connection oriented application with other networking devices.
IJSRSET151184 | Received: 25 Feb 2015 | Accepted: 27 Feb 2015 | January-February 2015 [(1)1: 354-357] 354
feature for storage cost at the cloud side should be II. METHODS AND MATERIAL
weighed opposed its bandwidth saving profits.
The solution which calculates its account on cloud side ALGORITHM
will result in low cost than the power of influences that
includes client-side capabilities. It is clearly analyzed The collection of information from the receiver to the
that this end-to-end solution is an huge amount of PRED-ACK receiver which is analysed in the form of
information to the servers, which may remove the cost various sizes and types. The applicable data find its
package. It further enhances that there is an effect in similar match in the receiver storage termed as Data
maintenance which cause defect in its effect. We are Store. If two data’s are found alike then the receiver
using end-to-end TRE technique to rely its power upon retrieves the order of further data. With the help of build
for predictions to reduce the traffic. chain the receiver sends the attributes that are needed to
the sender for the further data. Attributes refers to
Between the cloud and its end-users, the receiver will prediction which is considered as hint.
notice every action of incoming stream and tries to equal
with the previously received data in the local store. The prediction sent by the receiver includes the range of
For the long term data are stored in the separate storage predicted data, hint and signature of the data. The sender
place called local store and they were treated as catches the range in the order form and clarifies for that
metadata information which is kept locally. range. Once the output matches, it continues SHA-1
operation by sending acknowledgement message.
The receiver need some data to access so it sends some
predictions to the server along with the data signature
and that becomes very easy to verify the hint and
performs TRE operation when the hint get its match. By
this operation, we can avoid the expensive of the sender-
side with the absence of traffic redundancy. When the
redundancy was found in the system the sender sends
only the ACK for the prediction instead of sending data.
ACKNOWLEDGEMENT PROCESS
PERFORMANCE COST
V. REFERENCES
Here, we are using two commonly unused TCP option
codes. First one is to empower the option of PRED-ACK
[1] B.Aggarwal, A.Akella, A.Anand, A.Balachandran, P.Chitnis,
allow to send in a SYN portion to denote that the PRED- C.Muthukrish, R.Ramjee and G.Varghese, “EndRE: An end-
ACK portion was used later connection was established. system redundancy elimination service for enterprises,” in Proc.
The other one is for PRED-ACK message that might be NSDI, 2010,pp.28-28.
sent across the established connection was permitted by [2] “PACK source code,” 2011 [Online]. Availale: http://www.
eyalzo.com/projects/ pack.
the two parties.
[3] E. Lev-Ran, I.Cidon, and I.Z. Ben-Shaul, “Method and
apparatus for reducing network traffic over low bandwidth
IV. CONCLUSION links,” US Patent 7636767, Nov.2009.