The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - June (2010 vol.9)
pp: 778-795
Khaleel Mershad , American University of Beirut, Beirut
Hassan Artail , American University of Beirut, Beirut
ABSTRACT
This paper proposes a cache consistency scheme based on a previously proposed architecture for caching database data in MANETs. The original scheme for data caching stores the queries that are submitted by requesting nodes in special nodes, called query directories (QDs), and uses these queries to locate the data (responses) that are stored in the nodes that requested them, called caching nodes (CNs). The consistency scheme is server-based in which control mechanisms are implemented to adapt the process of caching a data item and updating it by the server to its popularity and its data update rate at the server. The system implements methods to handle disconnections of QD and CN nodes from the network and to control how the cache of each node is updated or discarded when it returns to the network. Estimates for the average response time of node requests and the average node bandwidth utilization are derived in order to determine the gains (or costs) of employing our scheme in the MANET. Moreover, ns2 simulations were performed to measure several parameters, like the average data request response time, cache update delay, hit ratio, and bandwidth utilization. The results demonstrate the advantage of the proposed scheme over existing systems.
INDEX TERMS
Data caching, cache consistency, invalidation, server-based approach, MANET.
CITATION
Khaleel Mershad, Hassan Artail, "SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments", IEEE Transactions on Mobile Computing, vol.9, no. 6, pp. 778-795, June 2010, doi:10.1109/TMC.2010.18
REFERENCES
[1] S. Acharya, R. Alonso, M. Franklin, and S. Zdonik, "Broadcast Disks: Data Management for Asymmetric Communications Environments," Proc. ACM SIGMOD, pp. 199-210, May 1995.
[2] H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, "COACS: A Cooperative and Adaptive Caching System for MANETS," IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug. 2008.
[3] H. Artail and K. Mershad, "MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 8, no. 10, pp. 1412-1426, Oct. 2009.
[4] O. Bahat and A. Makowski, "Measuring Consistency in TTL-Based Caches," Performance Evaluation, vol. 62, pp. 439-455, 2005.
[5] D. Barbara and T. Imielinski, "Sleepers and Workaholics: Caching Strategies for Mobile Environments," Proc. ACM SIGMOD, pp. 1-12, May 1994.
[6] C. Bettstetter and J. Eberspacher, "Hop Distances in Homogeneous Ad Hoc Networks," IEEE Proc. 57th IEEE Semiann. Vehicular Technology Conf., vol. 4, pp. 2286-2290, Apr. 2003.
[7] N.A. Boudriga and M.S. Obaidat, "Fault and Intrusion Tolerance in Wireless Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), vol. 4, pp. 2281-2286, 2005.
[8] J. Cai and K. Tan, "Energy-Efficient Selective Cache Invalidation," Wireless Networks J., vol. 5, no. 6, pp. 489-502, Dec. 1999.
[9] J. Cao, Y. Zhang, L. Xie, and G. Cao, "Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANETs," Proc. Third Int'l Workshop Mobile Distributed Computing, vol. 6, pp. 573-579, 2005.
[10] G. Cao, "A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept. 2003.
[11] P. Cao and C. Liu, "Maintaining Strong Cache Consistency in the World-Wide Web," IEEE Trans. Computers, vol. 47, no. 4, pp. 445-457, Apr. 1998.
[12] Y. Chung and C. Hwang, "Transactional Cache Management with Aperiodic Invalidation Scheme in Mobile Environments," Advances in Computing Science, pp. 50-61, Springer, 1999.
[13] A. Elmagarmid, J. Jing, A. Helal, and C. Lee, "Scalable Cache Invalidation Algorithms for Mobile Data Access," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1498-1511, Nov. 2003.
[14] H. Jin, J. Cao, and S. Feng, "A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs," Proc. Third IFIP Int'l Conf. Embedded and Ubiquitous Computing, Dec. 2007.
[15] IEEE Standard 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE, 1999.
[16] J. Jing, A. Elmagarmid, A. Helal, and R. Alonso, "Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments," Mobile Networks and Applications, vol. 15, no. 2, pp. 115-127, 1997.
[17] J. Jung, A.W. Berger, and H. Balakrishnan, "Modeling TTL-Based Internet Caches," Proc. IEEE INFOCOM, Mar. 2003.
[18] X. Kai and Y. Lu, "Maintain Cache Consistency in Mobile Database Using Dynamical Periodical Broadcasting Strategy," Proc. Second Int'l Conf. Machine Learning and Cybernetics, pp. 2389-2393, 2003.
[19] B. Krishnamurthy and C.E. Wills, "Piggyback Server Invalidation for Proxy Cache Coherency," Proc. Seventh World Wide Web (WWW) Conf., Apr. 1998.
[20] B. Krishnamurthy and C.E. Wills, "Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web," Proc. USENIX Symp. Internet Technologies and Systems, Dec. 1997.
[21] D. Li, P. Cao, and M. Dahlin, "WCIP: Web Cache Invalidation Protocol," IETF Internet Draft, http://tools.ietf.org/htmldraft-danli-wrec-wcip-01 , Mar. 2001.
[22] W. Li, E. Chan, Y. Wang, and D. Chen, "Cache Invalidation Strategies for Mobile Ad Hoc Networks," Proc. Int'l Conf. Parallel Processing, Sept. 2007.
[23] S. Lim, W.-C. Lee, G. Cao, and C.R. Das, "Performance Comparison of Cache Invalidation Strategies for Internet-Based Mobile-Ad Hoc Networks," Proc. IEEE Int'l Conf. Mobile Ad-Hoc and Sensor Systems, pp. 104-113, Oct. 2004.
[24] M.N. Lima, A.L. dos Santos, and G. Pujolle, "A Survey of Survivability in Mobile Ad Hoc Networks," IEEE Comm. Surveys and Tutorials, vol. 11, no. 1, pp. 66-77, First Quarter 2009.
[25] H. Maalouf and M. Gurcan, "Minimisation of the Update Response Time in a Distributed Database System," Performance Evaluation, vol. 50, no. 4, pp. 245-266, 2002.
[26] P. Papadimitratos and Z.J. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Workshop Wireless Security (WiSe '03), pp. 41-50, 2003.
[27] J.P. Sheu, C.M. Chao, and C.W. Sun, "A Clock Synchronization Algorithm for Multi-Hop Wireless Ad Hoc Networks," Proc. 24th Int'l Conf. Distributed Computing Systems, pp. 574-581, 2004.
[28] W. Stallings, Cryptography and Network Security, fourth ed. Prentice Hall, 2006.
[29] D. Wessels, "Squid Internet Object Cache," http:/www. squid-cache.org , Aug. 1998.
[30] J. Xu, X. Tang, and D. Lee, "Performance Analysis of Location-Dependent Cache Invalidation Schemes for Mobile Environments," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 2, pp. 474-488, Feb. 2003.
[31] L. Yin, G. Cao, and Y. Cai, "A Generalized Target Driven Cache Replacement Policy for Mobile Environments," Proc. Int'l Symp. Applications and the Internet (SAINT '03), Jan. 2003.
[32] J. Yuen, E. Chan, K. Lain, and H. Leung, "Cache Invalidation Scheme for Mobile Computing Systems with Real-Time Data," SIGMOD Record, vol. 29, no. 4, pp. 34-39, Dec. 2000.
[33] D. Zhou and T.H. Lai, "An Accurate and Scalable Clock Synchronization Protocol for IEEE 802.11-Based Multihop Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1797-1808, Dec. 2007.
[34] G. Zipf, Human Behavior and the Principle of Least Effort. Addison-Wesley, 1949.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool