Important: Use custom search function to get better results from our thousands of pages

Use " " for compulsory search eg:"electronics seminar" , use -" " for filter something eg: "electronics seminar" -"/tag/" (used for exclude results from tag pages)
Ask More Info Of  A Seminar Ask More Info Of A Project Post Reply  Follow us on Twitter
20-07-2012, 01:10 PM
Post: #1
CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA

CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA


.doc  1CACHE INVALIDATION SCHEME.doc (Size: 472 KB / Downloads: 15)
Abstract

In this paper, we propose a cache invalidation scheme called Invalidation by Absolute Validity Interval (IAVI) for mobile computing systems. In IAVI, we define an absolute validity interval (AVI), for each data item based on its dynamic property such as the update interval. A mobile client can verify the validity of a cached item by comparing the last update time and its AVI. A cached item is invalidated if the current time is greater than the last update time plus its AVI. With this self-invalidation mechanism, the IAVI scheme uses the invalidation report to inform the mobile clients about changes in AVIs rather than the update event of the data items. As a result, the size of the invalidation report can be reduced significantly. Through extensive simulation experiments, we have found that the performance of the IVAI scheme is significantly better than other methods such as bit sequence and timestamp.

Introduction

Recent advances in mobile communication technology have greatly increased the functionality of mobile information services. An important application of mobile computing systems is to provide various types of real-time information such as stock quotes, weather conditions and traffic information, to mobile clients [SLR99]. A number of efficient data dissemination strategies have been proposed in recent years. Amongst the proposed methods, most are based on data broadcast as it is very cost effective in disseminating a substantial amount of information to a large number of mobile clients [AAFZ95, DCKV97].

Related Work

Caching frequently accessed data items on the client side has been recognised as an important technique to reduce access delay and network traffic in a limited bandwidth mobile environment. Barbara and Imielinski, in one of the earliest work in this area, proposed three different variants of this approach Broadcasting Timestamp (TS), Amnesic Terminals (AT) and Signatures (SIG) depending on the expected duration of network disconnection [BI94]. However, the algorithms are only effective if the clients have not been disconnected for a period exceeding an algorithm specific parameter. Otherwise the entire cache has be to be discarded even though some of the cached data items might still be valid.
Jing et. al. proposed a bit-sequence scheme (BS) in
which the invalidation report consists of bit sequences associated with a set of timestamps [JEHL95]. Using the information embedded in the bit sequences, a client needs only to invalidate its entire cache if more than half of the data items have been updated in the server since its last invalidation time.

Absolute Validity Interval (AVI)

An important characteristic of the data items in a mobile computing system is that they possess different degrees of real-time properties, e.g., they often represent the current status of the objects in the external environment, whose value may change quite rapidly [SLR99]. Examples include news updates and the latest market prices of stocks. Due to the real-time properties of the data items, updates, which are captured by some external devices or obtained from data vendors, are required to maintain the validity of the data values. Usually, stale (invalid) data values are much less useful.
Basically, there are two types of update arrival
patterns: periodic and sporadic. For example, the arrival of the most current price of a stock is sporadic. For some data items, it may not be necessary to track all the changes in values. It might be sufficient to only sample the changes to the status of the actual objects periodically (an example is road traffic conditions).

Performance Study

We have compare d the performance of IAVI with two efficient schemes, Bit-Sequence (BS) [JEHL95] and Timestamp (TS) [BI94]. Furthermore, an idealized cache invalidation scheme called Perfect Server (PS) is also developed for comparison purposes. In PS, it is assumed that the system has full knowledge of the content of all the mobile clients ’ caches . As a result , the invalidation report s generated by PS will only contain the update information of the data items cached in the mobile client’s caches, thus, releasing more broadcast bandwidth for data dissemination. Such a scheme would be too costly to implement in real-life as it requires the generation of updates regarding the content of mobile client caches continuously to the mobile server.

Conclusions

In a mobile computing environment, mobile clients are usually equipped with local cache for reducing latency in data accesses. However, the frequent disconnection of mobile clients from the network and updates occurring at the mobile server introduces the problem of cache incoherence. Several cache invalidation schemes, such as Timestamps and Bit- sequence have been proposed to maintain cache coherence efficiently. The former sends out detailed update records within the predefined window frame to its client for cache invalidation while the latter organizes and records the update records in a report whose size depends on the database size.
Rating CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA Options
Share CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA To Your Friends :- Seminar Topics Bookmark
Post Reply 

Marked Categories : cache invalidation strategies, caching schemes in mobile computing, mobile computng real time projects, project on cache in mobile copmuting,

[-]
Quick Reply
Message
Type your reply to this message here.


Image Verification
Image Verification
(case insensitive)
Please enter the text within the image on the left in to the text box below. This process is used to prevent automated posts.

Possibly Related Threads...
Thread: Author Replies: Views: Last Post
  MOBILE SAMPLING OF SENSOR FIELD DATA USING CONTROLLED BROADCAST seminar tips 2 342 16-04-2014 12:42 PM
Last Post: mkaasees
  Slicing: A new Approach for Privacy Preserving Data Publishing PPT study tips 7 2,464 14-04-2014 10:04 AM
Last Post: mkaasees
Video Web based Mobile Service Provider projectsofme 6 3,443 12-04-2014 04:49 PM
Last Post: seminar post
  Ensuring distributed accountability for data sharing in the cloud ppt seminar projects maker 0 37 12-04-2014 12:31 PM
Last Post: seminar projects maker
  MULTICAST MULTI-PATH POWER EFFICIENT ROUTING IN MOBILE ADHOC NETWORKS REPORT seminar post 0 42 09-04-2014 03:59 PM
Last Post: seminar post
  A PROJECT REPORT ON NETWORK SIMULATION OF DATA THROUGH ATM SWITCH seminar projects maker 0 53 09-04-2014 12:13 PM
Last Post: seminar projects maker
  Disturbance Data Collection Solution Using SYNC 3000 and SYNC 4000 pdf seminar projects maker 0 55 01-04-2014 04:53 PM
Last Post: seminar projects maker
  The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks seminar flower 4 2,546 31-03-2014 11:32 AM
Last Post: mkaasees
  Cloud Computing Security: From Single to Multi-Clouds PPT seminar flower 11 8,202 29-03-2014 02:59 PM
Last Post: mkaasees
  Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network Projects9 3 942 28-03-2014 04:23 PM
Last Post: mkaasees
This Page May Contain What is CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA And Latest Information/News About CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA,If Not ...Use Search to get more info about CACHE INVALIDATION SCHEME FOR MOBILE COMPUTING SYSTEMS WITH REAL-TIME DATA Or Ask Here

Options: