The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - April (2013 vol.12)
pp: 680-693
K. Fawaz , Electr. & Comput. Eng. Dept., American Univ. of Beirut, Beirut, Lebanon
H. Artail , Electr. & Comput. Eng. Dept., American Univ. of Beirut, Beirut, Lebanon
ABSTRACT
This paper proposes distributed cache invalidation mechanism (DCIM), a client-based cache consistency scheme that is implemented on top of a previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes cache the queries and the addresses of the nodes that store the responses to these queries. We have also previously proposed a server-based consistency scheme, named SSUM, whereas in this paper, we introduce DCIM that is totally client-based. DCIM is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides near strong consistency capabilities. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source, where items with expired TTL values are grouped in validation requests to the data source to refresh them, whereas unexpired ones but with high request rates are prefetched from the server. In this paper, DCIM is analyzed to assess the delay and bandwidth gains (or costs) when compared to polling every time and push-based schemes. DCIM was also implemented using ns2, and compared against client-based and server-based schemes to assess its performance experimentally. The consistency ratio, delay, and overhead traffic are reported versus several variables, where DCIM showed to be superior when compared to the other systems.
INDEX TERMS
Servers, Mobile computing, Prefetching, Ad hoc networks, Delay, Monitoring,TTL, Cache consistency, data caching, client-based, invalidation, MANET
CITATION
K. Fawaz, H. Artail, "DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks", IEEE Transactions on Mobile Computing, vol.12, no. 4, pp. 680-693, April 2013, doi:10.1109/TMC.2012.37
REFERENCES
[1] T. Andrel and A. Yasinsac, "On Credibility of MANET Simulations," IEEE Computer, vol. 39, no. 7, pp. 48-54, July 2006.
[2] H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, "COACS: A Cooperative and Adaptive Caching System for MANETS," IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug. 2008.
[3] D. Barbara and T. Imielinski, "Sleepers and Workaholics: Caching Strategies for Mobile Environments," Proc. ACM SIGMOD, pp. 1-12, May 1994.
[4] G. Cao, "A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments," IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept./Oct. 2003.
[5] D. Li, P. Cao, and M. Dahlin, "WCIP: Web Cache Invalidation Protocol," IETF Internet draft, http://tools.ietf.org/html draft-danli-wrec-wcip-01 , Mar. 2001.
[6] J. Cao, Y. Zhang, G. Cao, and X. Li, "Data Consistency for Cooperative Caching in Mobile Environments," Computer, vol. 40, no. 4, pp. 60-66, 2007.
[7] P. Cao and C. Liu, "Maintaining Strong Cache Consistency in the World-Wide Web," IEEE Trans. Computers, vol. 47, no. 4, pp. 445-457, Apr. 1998.
[8] W. Li, E. Chan, D. Chen, and S. Lu, "Maintaining Probabilistic Consistency for Frequently Offline Devices in Mobile Ad Hoc Networks," Proc. IEEE 29th Int'l Conf. Distributed Computing Systems, pp. 215-222, 2009.
[9] J. Jung, A.W. Berger, and H. Balakrishnan, "Modeling TTL-Based Internet Caches," Proc. IEEE INFOCOM, Mar. 2003.
[10] B. Krishnamurthy and C. Wills, "Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web," Proc. USENIX Symp. Internet Technologies and Systems, Dec. 1997.
[11] J. Lee, K. Whang, B. Lee, and J. Chang, "An Update-Risk Based Approach to TTL Estimation in Web Caching," Proc. Third Int'l Conf. Web Information Systems Eng. (WISE '02), pp. 21-29, 2002.
[12] D. Wessels, Squid Internet Object Cache, http:/squid.nlanr.net, Aug. 1998.
[13] Y. Huang, J. Cao, Z. Wang, B. Jin, and Y. Feng, "Achieving Flexible Cache Consistency for Pervasive Internet Access," Proc. IEEE Fifth Ann. Int'l Conf. Pervasive Computing and Comm., pp. 239-250, 2007.
[14] O. Bahat and A. Makowski, "Measuring Consistency in TTL-Based Caches," Performance Evaluation, vol. 62, pp. 439-455, 2005.
[15] M. Denko and J. Tian, "Cooperative Caching with Adaptive Prefetching in Mobile Ad Hoc Networks," Proc. IEEE Int'l Conf. Wireless and Mobile Computing, Networking and Comm. (WiMob '06), pp. 38-44, June 2006.
[16] J. Jing, A. Elmagarmid, A. Helal, and R. Alonso, "Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments," Mobile Networks and Applications, vol. 2, pp. 115-127, 1997.
[17] Q. Hu and D. Lee, "Cache Algorithms Based on Adaptive Invalidation Reports for Mobile Environments," Cluster Computing, vol. 1, pp. 39-50, 1998.
[18] Z. Wang, S. Das, H. Che, and M. Kumar, "A Scalable Asynchronous Cache Consistency Scheme (SACCS) for Mobile Environments," IEEE Trans. Parallel and Distributed Systems, vol. 15, no. 11, pp. 983-995, Nov. 2004.
[19] S. Lim, W.C. Lee, G. Cao, and C. Das, "Cache Invalidation Strategies for Internet-Based Mobile Ad Hoc Networks," Computer Comm., vol. 30, pp. 1854-1869, 2007.
[20] K.S. Khurana, S. Gupta, and P. Srimani, "A Scheme to Manage Cache Consistency in a Distributed Mobile Wireless Environment," IEEE Trans. Parallel and Distributed Systems, vol. 12, no. 7, pp. 686-700, 2001.
[21] V. Cate, "Alex - A Global Filesystem," Proc. USENIX File System Workshop, pp. 1-12, May 1992.
[22] L. Yin and G. Cao, "Supporting Cooperative Caching in Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, Jan. 2006.
[23] G. Cao, L. Yin, and C. Das, "Cooperative Cache-Based Data Access in Ad Hoc Networks," Computer, vol. 37, no. 2, pp. 32-39, 2004.
[24] X. Tang, J. Xu, and W-C. Lee, "Analysis of TTL-Based Consistency in Unstructured Peer-to-Peer Networks," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 12, pp. 1683-1694, Dec. 2008.
[25] L. Bright, A. Gal, and L. Raschid, "Adaptive Pull-Based Policies for Wide Area Data Delivery," ACM Trans. Database Systems, vol. 31, no. 2, pp. 631-671, 2006.
[26] C.P. Danzig, C. Neerdaels, M. Schwartz, and K. Worrell, "A Hierarchical Internet Object Cache," Proc. Ann. Conf. USENIX Ann. Technical Conf., p. 13, 1996.
[27] V. Jacobson, "Congestion Avoidance and Control," Proc. ACM SIGCOMM Computer Comm. Rev., vol. 25, p. 187, 1995.
[28] X. Chen and P. Mohapatra, "Lifetime Behavior and its Impact on Web Caching," Proc. IEEE Workshop Internet Applications, pp. 54-61, 1999.
[29] Y. Sit, F. Lau, and C-L. Wang, "On the Cooperation of Web Clients and Proxy Caches," Proc. 11th Int'l Conf. Parallel and Distributed Systems, pp. 264- 270, July 2005.
[30] U.A. Ninan, M. Raunak, P. Shenoy, and K. Ramamritham, "Maintaining Mutual Consistency for Cached Web Objects," Proc. 21st Int'l Conf. Distributed Computing Systems, p. 371, 2001.
[31] N. Chand, R. Joshi, and M. Misra, "A Zone Co-Operation Approach for Efficient Caching in Mobile Ad Hoc Networks," Int'l J. Comm. Systems, vol. 19, pp. 1009-1028, 2006.
[32] Y. Du and S.K.S. Gupta, "COOP - A Cooperative Caching Service in MANETs," Proc. Joint Int'l Conf. Autonomic and Autonomous Systems and Int'l Conf. Networking and Services (ICAS-ICNS), pp. 58-58, Oct. 2005.
[33] Y. Du, S. Gupta, and G. Varsamopoulos, "Improving On-Demand Data Access Efficiency in MANETs with Cooperative Caching," Ad Hoc Networks, vol. 7, pp. 579-598, 2009.
[34] C.C. Holt, "Forecasting Seasonals and Trends by Exponentially Weighted Moving Averages," Int'l J. Forecasting, vol. 20, no. 1, pp. 5-10, 2004.
[35] K. Mershad and H. Artail, "SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments," IEEE Trans. Mobile Computing, vol. 9, no. 6, pp. 778-795, June 2010.
[36] B. Krishnamurthy and C.E. Wills, "Piggyback Server Invalidation for Proxy Cache Coherency," Proc. Seventh Int'l Conf. World Wide Web, Apr. 1998.
[37] Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, "TTL Prediction Schemes and the Effects of Inter-Update Time Distribution on Wireless Data Access," Wireless Networks, vol. 10, pp. 607-619, 2004.
[38] G. Zipf, Human Behavior and the Principle of Least Effort. Addison-Wesley, 1949.
[39] N. Boudriga and M. Obaidat, "Fault and Intrusion Tolerance in Wireless Ad Hoc Networks," Proc. IEEE Wireless Comm. Networking Conf., 2005.
[40] P. Papadimitratos and Z. Haas, "Secure Data Transmission in Mobile Ad Hoc Networks," Proc. ACM Workshop Wireless Security, pp. 41-50, 2003.
[41] W. Zhang and G. Cao, "Defending Against Cache Consistency Attacks in Wireless Ad Hoc Networks," Ad Hoc Networks, vol. 6, pp. 363-379, 2008.
[42] H. Maalouf and M. Gurcan, "Minimisation of the Update Response Time in a Distributed Database System," Performance Evaluation, vol. 50, no. 4, pp. 245-66, 2002.
[43] T. Hara and S. Madria, "Dynamic Data Replication using Aperiodic Updates in Mobile Ad Hoc Networks," Proc. Database Systems for Advanced Applications, pp. 111-136, 2004.
[44] K. Fawaz and H. Artail, "A Two-Layer Cache Replication Scheme for Dense Mobile Ad Hoc Networks," Proc. IEEE Global Comm. Conf. (GlobeCom), Dec. 2012.
87 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool