[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

An Efficient Cache Access Protocol in a Mobile Computing Environment

  • Conference paper
Parallel and Distributed Processing and Applications (ISPA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3758))

  • 794 Accesses

Abstract

The use of periodic invalidation reports (IRs), has been shown to be a useful technique for conserving wireless bandwidth and battery power. However, IR-based schemes have some drawbacks, such as long query delay and low client caching availability, even if the clients have sufficient local cache capacity. In this paper, we propose an efficient cache access protocol to address these problems. Instead of passively waiting, the clients use the local cache actively. Using our protocol, we can remove the ”false alarm” that causes unnecessary delay. Based on our threshold-based scheme, the proposed protocol can optimize response time with little loss of data currency. Our simulation results are carried out to evaluate the proposed methodology. Compared to previous IR-based schemes, our scheme can reduce the response time significantly with a very little loss of data currency.

This work was done as a part of Information & Communication Fundamental Technology Research Program, supported by Ministry of Information & Communication in Republic of Korea.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Acharya, S., Franklin, M.J., Zdonik, S.B.: Disseminating updates on broadcast disks. In: Proceedings of International Conference on VLDB, pp. 354–365 (1996)

    Google Scholar 

  2. Barbar, D., Imielinski, T.: Sleepers and workaholics: Caching strategies in mobile environments. In: Proceedings of ACM SIGMOD Conference on Management of Data, pp. 1–12 (1994)

    Google Scholar 

  3. Cao, G.: On improving the performance of cache invalidation in mobile environments. ACM/Baltzer Journal on Special Topics in Mobile Networks and Applications 7(4), 291–303 (2002)

    Article  Google Scholar 

  4. Cao, G.: Proactive power-aware cache management for mobile computing systems. IEEE Transactions on Computers 51(6), 608–621 (2002)

    Article  Google Scholar 

  5. Cao, G.: A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering 15(5), 1251–1265 (2003)

    Article  Google Scholar 

  6. Guo, H., Larson, P.-A., Ramakrishnan, R., Goldstein, J.: Relaxed currency and consistency: How to say ”good enough” in sql. In: Proceedings of ACM SIGMOD Conference on Management of Data, pp. 815–826 (2004)

    Google Scholar 

  7. Hu, Q., Lee, D.L.: Cache algorithms based on adaptive invalidation reports for mobile environments. Journal of Cluster Computing 1(1), 39–50 (1998)

    Article  Google Scholar 

  8. Imielinski, T., Viswanathan, S., Badrinath, B.: Data on air: Organization and access. IEEE Transactions on Knowledge and Data Engineering 9(3), 353–372 (1997)

    Article  Google Scholar 

  9. Jing, J., Elmagarmid, A.K., Helal, A., Alonso, R.: Bit-sequences: An adaptive cache invalidation method in mobile client/server environments. ACM Journal of Mobile Networks and Applications 2(2), 115–127 (1997)

    Article  Google Scholar 

  10. Kahol, A., Khurana, S., Gupta, S.K., Srimani, P.K.: A strategy to manage cache consistency in a disconnected distributed environment. IEEE Transactions on Parallel Distributed Systems 12(7), 686–700 (2001)

    Article  Google Scholar 

  11. Ovalle-Martinez, F.J., Gonzalez, J.S., Stojmenovic, I.: A parallel hill climbing algorithm for pushing dependent data in clients-providers-servers systems. ACM/Baltzer Journal on Special Topics in Mobile Networks and Applications 9(4), 257–264 (2004)

    Article  Google Scholar 

  12. Ram, D.J., Mahesh, M.U., Sekhar, N.S.K.C., Babu, C.: Causal consistency in mobile environment. In: Proceedings of ACM SIGOPS Conference, pp. 34–40 (2001)

    Google Scholar 

  13. Schwetman, H.: CSIM user’s guide(version 18). Mesquite Software, Inc., http://www.mesquite.com

  14. Tan, K.-L., Cai, J., Ooi, B.C.: An evaluation of cache invalidation strategies in wireless environments. IEEE Transactions on Parallel Distributed Systems 12(8), 789–807 (2001)

    Article  Google Scholar 

  15. I. WG.: Draft supplement to part 11: Wireless medium access control (mac) and physical layer (phy) specifications. Technical report, IEEE Std. 802.11e/D4.3 (2003)

    Google Scholar 

  16. Xu, J., Tang, X., Lee, D.L.: Performance analysis of location-dependent cache invalidation schemes for mobile environments. IEEE Transactions on Knowledge and Data Engineering 15(2), 474–488 (2003)

    Article  Google Scholar 

  17. Yeung, M.K.H., Kwok, Y.-K.: Wireless cache invalidation schemes with link adaptation and downlink traffic. IEEE Transactions on Mobile Computing 4(1), 68–83 (2005)

    Article  Google Scholar 

  18. Zheng, B., Lee, W.-C., Lee, D.L.: On semantic caching and query scheduling for mobile nearest-neighbor search. IEEE Transactions on Wireless Networks 10(6), 653–664 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Choi, JH., Lee, S. (2005). An Efficient Cache Access Protocol in a Mobile Computing Environment. In: Pan, Y., Chen, D., Guo, M., Cao, J., Dongarra, J. (eds) Parallel and Distributed Processing and Applications. ISPA 2005. Lecture Notes in Computer Science, vol 3758. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11576235_111

Download citation

  • DOI: https://doi.org/10.1007/11576235_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29769-7

  • Online ISBN: 978-3-540-32100-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics