This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments
March/April 2003 (vol. 15 no. 2)
pp. 474-488

Abstract—Mobile location-dependent information services are gaining increasing interest in both academic and industrial communities. In these services, data values depend on their locations. Caching frequently accessed data on mobile clients can help save wireless bandwidth and improve system performance. However, since client location changes constantly, location-dependent data may become obsolete not only due to updates performed on data items but also because of client movements across the network. To the best of the authors' knowledge, previous work on cache invalidation issues focused on data updates only. This paper considers data inconsistency caused by client movements and proposes three location-dependent cache invalidation schemes. The performance for the proposed schemes is investigated by both analytical study and simulation experiments in a scenario where temporal- and location-dependent updates coexist. Both analytical and experimental results show that, in most cases, the proposed methods substantially outperform the NSI scheme, which drops the entire cache contents when hand-off is performed.

[1] A. Acharya, B.R. Badrinath, T. Imielinski, and J.C. Navas, “A WWW-Based Location-Dependent Information Service for Mobile Clients,” technical report, Dept. of Computer Science, Rutgers Univ., July 1995.
[2] I.F. Akyildiz, Y.-B. Lin, W.-R. Lai, and R.-J. Chen, “A New Random Walk Model for PCS Networks,” IEEE J. Selected Areas in Comm. (JSAC): Wireless Series, vol. 18, no. 7, pp. 1254-1261, July 2000.
[3] R. Alonso, D. Barbara, and H. Garcia-Molina, "Data Caching Issues in an Information Retrieval System," ACM Trans. Database Systems, vol. 15, no. 3, pp. 359-384, Sept. 1990.
[4] D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies in Mobile Environments,” Proc. ACM SIGMOD, pp. 1-12, May 1994.
[5] O.A. Bukhres and J. Jing, “Performance Analysis of Adaptive Caching Algorithms in Mobile Environments,” Information Sciences, vol. 95, no. 1-2, pp. 1-27, Nov. 1996.
[6] J. Cai and K.L. Tan, “Energy-Efficient Selective Cache Invalidation,” Wireless Networks, vol. 5, no. 6, pp. 489-502, 1999.
[7] J. Cai, K.L. Tan, and B.C Ooi, “On Incremental Cache Coherency Schemes in Mobile Computing Environment,” Proc. 13th Int'l Conf. Data Eng., pp. 114-123, Apr. 1997.
[8] G. Cao, “A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments,” Proc. ACM Int'l Conf. Mobile Computing and Networking (MobiCom), pp. 200-209, Aug. 2000.
[9] B.Y.L. Chan, A. Si, and H.V. Leong, Cache Management for Mobile Databases: Design and Evaluation Proc. 14th Int'l Conf. Data Eng. (ICDE '98), pp. 54-63, Feb. 1998.
[10] K. Cheverst et al., "Experiences of Developing and Deploying a Context-Aware Tourist Guide: The Lancaster Guide Project," Proc. 6th Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networking (Mobicom), ACM Press, 2000, pp. 20-31.
[11] S. Dar, M.J. Franklin, B.T. Jonsson, D. Shrivastava, and M. Tan, “Semantic Data Caching and Replacement,” Proc. VLDB, pp. 330-341, 1996.
[12] M.H. Dunham and V. Kumar, “Location Dependent Data and its Management in Mobile Databases,” Proc. Ninth Int'l Workshop Database and Expert Systems Applications, pp. 26-29, Aug. 1998.
[13] C.C.F. Fong, J.C.S. Lui, and M.H. Wong, Quantifying Complexity and Performance Gains of Distributed Caching in a Wireless Network Environment Proc. 13th Int'l Conf. Data Eng. (ICDE '97), pp. 104-113, Oct. 1997.
[14] L. Forlizzi, R.H. Güting, E. Nardelli, and M. Schneider, “A Data Model and Data Structures for Moving Objects Databases,” Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 319-330, May 2000.
[15] I.A. Getting, “The Global Positioning System,” IEEE Spectrum, vol. 12, no. 30, pp. 36-38, 43-47, Dec. 1993.
[16] A. Harter et al., "The Anatomy of a Context-Aware Application," Proc. 5th Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networking (MobiCom), ACM Press, New York, 1999, pp. 59-68.
[17] Q. Hu and D.K. Lee, “Cache Algorithms Based on Adaptive Invalidation Reports for Mobile Environments,” Cluster Computing, vol. 1, pp. 39-50, 1998.
[18] Q.L. Hu, D.L. Lee, and W.-C. Lee, “Performance Evaluation of a Wireless Hierarchical Data Dissemination System,” Proc. Fifth Ann. ACM/IEEE Int'l Conf. Mobile Computing and Networking (MobiCom '99), pp. 163-173, Aug. 1999.
[19] J. Jing, A. Elmagarmid, A. Helal, and R. Alonso, “Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments,” Mobile Networks and Applications, vol. 2, pp. 115-127, 1997.
[20] D. Lam, D.C. Cox, and J. Widom, “Teletrafic Modeling for Personal Communication Services,” IEEE Comm., vo. 35, no. 2, pp. 79-87, Feb. 1997.
[21] J.L. Park, S.-K. Lee, and H.-A. Choi, “Circuit-Switched Broadcasting in$d$-Dimensional Torus and Mesh Networks,” Proc. Int'l Parallel Processing Symp., pp. 26-29, 1994.
[22] E. Pitoura and P.K. Chrysanthis, “Exploiting Versions for Handling Updates in Broadcast Disks,” Proc. 25th Int'l Conf. Very Large Data Bases, pp. 114-125, 1999.
[23] N.B. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location-Support System," Proc. 6th Ann. Int'l Conf. Mobile Computing and Networks (MobiCom 2000), ACM Press, New York, 2000, pp. 32-43.
[24] Q. Ren and M.H. Dunham, “Using Clustering for Effective Management of a Semantic Cache in Mobile Computing,” Proc. First ACM Int'l Workshop Data Eng. for Wireless and Mobile Access, pp. 94-101, Aug. 1999.
[25] Q. Ren and M.H. Dunham, “Using Semantic Caching to Manage Location Dependent Data in Mobile Computing,” Proc. Sixth ACM/IEEE Int'l Conf. Mobile Computing and Networking, pp. 210-221, Aug. 2000.
[26] S. Saltenis, C.S. Jensen, S.T. Leutenegger, and M.A. Lopez, “Indexing the Positions of Continuously Moving Objects,” Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 331-342, May 2000.
[27] M. Satyanarayanan, J. Kistler, P. Kumar, M. Okasaki, E. Siegel, and D. Steere, "Coda: A Highly Available File System for a Distributed Workstation Environment," IEEE Trans. Computers, vol. 39, no. 4, Apr. 1990.
[28] H. Schwetman, CSIM User's Guide (Version 18), MCC Corporation,http:/www.mesquite.com, 1998.
[29] S. Shekhar, A. Fetterer, and D.-R. Liu, “Genesis: An Approach to Data Dissemination in Advanced Traveler Information Systems,” IEEE Data Eng. Bull., vol. 19, no. 3, pp. 40-47, Sept. 1996.
[30] P.A. Sistla, O. Wolfson, S. Chamberlain, and S. Dao, Modeling and Querying Moving Objects Proc. Int'l Conf. Data Eng., pp. 422-432, 1997.
[31] K.L. Tan and J. Cai, “Broadcast-Based Group Invalidation: An Energy Efficient Cache Invalidation Scheme,” Information Sciences, vol. 100, nos. 1-4, pp. 229-254, Aug. 1997.
[32] M. Taylor, M. Banan, and W. Waung, Internetwork Mobility: The CDPD Approach, Prentice Hall, 1997.
[33] J. Wang, “A Survey of Web Caching Schemes for the Internet,” ACM SIGCOMM Computer Comm. Rev., vol. 29, no. 5, pp. 36-46, Oct. 1999.
[34] O. Wolfson et al., "Moving Objects Databases: Issues and Solutions," Proc. 10th Int'l Conf. Scientific and Statistical Database Management (SSDBM98), 1998, pp. 111–122.
[35] K.L. Wu, P.S. Yu, and M.S. Chen, “Energy-Efficient Caching for Wireless Mobile Computing, Proc. 20th Int'l Conf. Data Eng., pp. 336-345, Mar. 1996.
[36] J. Xu and D.L. Lee, “Querying Location-Dependent Data in Wireless Cellular Environment,” WAP Forum/W3C Workshop Position Dependent Information Services, Feb. 2000.
[37] J. Xu et al., "Cache Coherency in Location-Dependent Information Services for Mobile Environments," Proc. 1st Int'l Conf. Mobile Data Access (MDA 99), Springer, Heidelberg, Germany, 1999, pp. 182-193.

Index Terms:
Mobile computing, wireless communication, location-dependent information, data management, cache consistency, semantic caching, performance analysis.
Citation:
Jianliang Xu, Xueyan Tang, Dik Lun Lee, "Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments," IEEE Transactions on Knowledge and Data Engineering, vol. 15, no. 2, pp. 474-488, March-April 2003, doi:10.1109/TKDE.2003.1185846
Usage of this product signifies your acceptance of the Terms of Use.