Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments Speaker : Hsin-Chin Mao Fu Jen Catholic University Computer.

Slides:



Advertisements
Similar presentations
1 Aggregated Traffic Flow Weight Controlled Hierarchical MAC Protocol for Wireless Sensor Networks Asia FI School Presented By Md. Abdur Razzaque Kyung.
Advertisements

1 Processamento de Consultas Espaciais Baseado em Cache Semântico Dependente de Localização Heloise Manica Murilo S. de Camargo Cristina Dutra de Aguiar.
Dissemination-based Data Delivery Using Broadcast Disks.
Self-Configurable Positioning Technique for Multi-hop Wireless Networks To appear in IEEE Transaction on Networking Chong Wang Center of Advanced Computer.
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Supporting Cooperative Caching in Disruption Tolerant Networks
Duagi Bulent UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY POLITEHNICA of BUCHAREST DEPARTMENT OF COMPUTER SCIENCE.
Investigating Distributed Caching Mechanisms for Hadoop Gurmeet Singh Puneet Chandra Rashid Tahir.
Location Services for Geographic Routing. Geographic Routing Three major components of geographic routing:  Location services (dissemination of location.
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
Intel Research Internet Coordinate Systems - 03/03/2004 Internet Coordinate Systems Marcelo Pias Intel Research Cambridge
© Vijay Kumar, Nitin Prabhu, Panos K. Chrysanthis, USA AICCSA – 2005, Cairo, Egypt Vijay Kumar & Nitin Prabhu SCE, Computer Networking University of Missouri-Kansas.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies Dilley, J.; Arlitt, M. A journal paper of IEEE Internet Computing, Volume: 3.
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies John Dilley and Martin Arlitt IEEE internet computing volume3 Nov-Dec 1999 Chun-Fu.
1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko, Kang-Won Lee, Thyaga Nandagopal Presentation by Tony Sung,
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
Dynamic Medial Axis Based Motion Planning in Sensor Networks Lan Lin and Hyunyoung Lee Department of Computer Science University of Denver
SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts Jianliang Xu, Qinglong Hu, Dik Lun Department of Computer Science in HK University.
Optimizing Lifetime for Continuous Data Aggregation With Precision Guarantees in Wireless Sensor Networks Xueyan Tang and Jianliang Xu IEEE/ACM TRANSACTIONS.
Announcements Your homework is due on September 19 th. Your homework is due on September 19 th. I will be away starting Sept 5 th.
Exposure In Wireless Ad-Hoc Sensor Networks S. Megerian, F. Koushanfar, G. Qu, G. Veltri, M. Potkonjak ACM SIG MOBILE 2001 (Mobicom) Journal version: S.
Jianliang XU, Dik L. Lee, and Bo Li Dept. of Computer Science Hong Kong Univ. of Science & Technology April 2002 On Bandwidth Allocation for Data Dissemination.
Top-k Monitoring in Wireless Sensor Networks Minji Wu, Jianliang Xu, Xueyan Tang, and Wang-Chien Lee IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Dual Prediction-based Reporting for Object Tracking Sensor Networks Yingqi Xu, Julian Winter, Wang-Chien Lee Department of Computer Science and Engineering,
Massively Distributed Database Systems Broadcasting - Data on air Spring 2014 Ki-Joune Li Pusan National University.
Fault-Tolerant Design for Mobile IPv6 Networks Jenn-Wei Lin and Ming-Feng Yang Graduate Institute of Applied Science and Engineering Fu Jen Catholic University.
A Prediction-based Fair Replication Algorithm in Structured P2P Systems Xianshu Zhu, Dafang Zhang, Wenjia Li, Kun Huang Presented by: Xianshu Zhu College.
CCAN: Cache-based CAN Using the Small World Model Shanghai Jiaotong University Internet Computing R&D Center.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 Probabilistic Continuous Update.
Managing Real-Time Transactions in Mobile Ad-Hoc Network Databases Le Gruenwald The University of Oklahoma School of Computer Science Norman, Oklahoma,
Design and Analysis of Advanced Replacement Policies for WWW Caching Kai Cheng, Yusuke Yokota, Yahiko Kambayashi Department of Social Informatics Graduate.
Overview of Mobile Database Caching
Introduction to DFS. Distributed File Systems A file system whose clients, servers and storage devices are dispersed among the machines of a distributed.
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Low Cost Commit Protocols for Mobile Computing Environments Marc Perron & Baochun Bai.
/ 22 1 A Distributed and Efficient Flooding Scheme Using 1-hop Information in Mobile Ad Hoc Networks Hai Liu Xiaohua Jia Peng-Jun Wan Dept. of Comput.
Data Replication and Power Consumption in Data Grids Susan V. Vrbsky, Ming Lei, Karl Smith and Jeff Byrd Department of Computer Science The University.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Ad Hoc Mobility Management With Uniform Quorum Systems Zygmunt J. Haas, Senior Member, IEEE and Ben Liang, Student Member, IEEE Networking, IEEE/ACM Transactions.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
Efficient Content Sharing Taking Account of Updating Replicas in Hybrid Peer-to-Peer Networks Tatsuru Kato, Shinji Sugawara, Yutaka Ishibashi Nagoya Institute.
A Biased Fault Attack on the Time Redundancy Countermeasure for AES Sikhar Patranabis, Abhishek Chakraborty, Phuong Ha Nguyen and Debdeep Mukhopadhyay.
A LOCALIZED SELF-HEALING ALGORITHM FOR NETWORKS OF MOVEABLE SENSOR NODES Mohamed Younis, Sookyoung Lee, Sheetal Gupta and Kevin Fisher Department of Computer.
Efficient Computing k-Coverage Paths in Multihop Wireless Sensor Networks XuFei Mao, ShaoJie Tang, and Xiang-Yang Li Dept. of Computer Science, Illinois.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Minji Wu, Jianliang Xu, Xueyan Tang, Wang-Chien Lee Professor : 陳朝鈞 教授 Speaker : 邱志銘 Minji Wu, Jianliang Xu, Xueyan Tang, Wang-Chien Lee, “Top-k Monitoring.
Massively Distributed Database Systems Broadcasting - Data on air Spring 2015 Ki-Joune Li Pusan National University.
A Deafness Free MAC Protocol for Ad Hoc Networks Using Directional Antennas Jia Feng, Pinyi Ren, and Shuangcheng Yan Department of Electronic Engineering.
Peer-to-Peer Video Systems: Storage Management CS587x Lecture Department of Computer Science Iowa State University.
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
Embedded System Lab. 정영진 The Design and Implementation of a Log-Structured File System Mendel Rosenblum and John K. Ousterhout ACM Transactions.
Quorum-based Power-Saving Multicast Protocols in the Asynchronous Ad Hoc Network Yu-Chen Kuo Department of Computer Science and Information Management.
A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem C.-F. Huang, H.-W. Lee, and Y.-C. Tseng Department of.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
Dynamic Proxy Tree-Based Data Dissemination Schemes for Wireless Sensor Networks Wensheng Zhang, Guohong Cao and Tom La Porta Department of Computer Science.
A Practical Performance Analysis of Stream Reuse Techniques in Peer-to-Peer VoD Systems Leonardo B. Pinho and Claudio L. Amorim Parallel Computing Laboratory.
Presented by Edith Ngai MPhil Term 3 Presentation
Golrezaei, N. ; Molisch, A.F. ; Dimakis, A.G.
The Impact of Replacement Granularity on Video Caching
Dissemination-based Data Delivery Using Broadcast Disks
SPEAKER: Yu-Shan Chou ADVISOR: DR. Kai-Wei Ke
Peer-to-Peer Video Services
Outline Announcements Lab2 Distributed File Systems 1/17/2019 COP5611.
Energy-Efficient Storage Systems
Outline Review of Quiz #1 Distributed File Systems 4/20/2019 COP5611.
Presentation transcript:

Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments Speaker : Hsin-Chin Mao Fu Jen Catholic University Computer Science and Information Engineering Department High Speed Networks Lab 2003/10/28

Outline Introduction The System Model Location-Dependent Invalidation Strategies Location-Dependent Cache Replacement Policies Simulation Model Performance Evaluation Conclusion References

Introduction two common issues in client cache management cache invalidation scheme cache replacement policy location-dependent data location-dependent cache invalidation valid scopes We first introduce two basic location-dependent invalidation schemes Polygonal Endpoints (PE) Approximate Circle (AC) a generic method Cache-Efficiency Based scheme (CEB)

The System Model two distinct sets of entities mobile clients fixed hosts ( mobile support stations (MSSs)) data item value from data item Mobile clients can identify their locations using systems such as the Global Positioning System (GPS) cache data values on its local disk or in any storage system; fixed sizes and read-only

Location-Dependent Invalidation Strategies The advantages of the idea that attach complete/partial invalidation information two situations where validity checking is necessary cache replacement policies The Polygonal Endpoints (PE) Scheme a straightforward way The Approximate Circle (AC) Scheme the overhead of this scheme can be minimized 56 bytes => 12 bytes

Location-Dependent Invalidation Strategies The Caching-Efficiency-Based (CEB) Method

Location-Dependent Cache Replacement Policies Data Distance the distance between the current location of a mobile client and the valid scope of a data value Valid Scope Area the geometric area of the valid scope of a data value proposed PA and PAID policies Probability Area (PA) Probability Area Inverse Distance (PAID)

Simulation Model System Execution Model 110 points randomly distributed in a square Euclidean space the locations of 185 hospitals in the Southern California area Server Execution Model Client Execution Model

Performance Evaluation Evaluation of Location-Dependent Invalidation Schemes Evaluation of Cache Replacement Policies uniform access (θ=0), skewed access(θ=0.5) Effect of Changing Query Interval Effect of Changing Moving Interval Effect of Cache Size Effect of Combining Different Invalidation and Replacement Schemes

Evaluation of Location-Dependent Invalidation Schemes

Effect of Changing Query Interval

Effect of Changing Moving Interval

Effect of Cache Size

Effect of Combining Different Invalidation and Replacement Schemes

Conclusions explored cache invalidation and replacement issues for location-dependent data under a geometric location model PE, AC, CEB proposed two cache replacement policies PA, PAID future work location-dependent queries

References Baihua Zheng, Jianliang Xu, Dik Lun Lee: Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments. IEEE Transactions on Computers 51(10): (2002) Baihua ZhengDik Lun Lee IEEE Transactions on Computers 51 Q. Ren and M.H. Dunham, Using Semantic Caching to Manage Location Dependent Data in Mobile Computing, Proc. Sixth Ann. ACM/IEEE Intl Conf. Mobile Computing and Networking (MobiCom 2000), pp , Aug G.K. Zipf, Human Behaviour and the Principle of Least Effort.Addison-Wesley, 1949.