Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility Huaping Shen, Mohan Kumar, Sajal K. Das, and Zhijun Wang P76934408 邱仁傑.

Slides:



Advertisements
Similar presentations
Energy Efficient Data Collection In Distributed Sensor Environments Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian {qhan, sharad,
Advertisements

Dissemination-based Data Delivery Using Broadcast Disks.
Green Network Project Contract
Online Algorithm Huaping Wang Apr.21
Cost-Based Cache Replacement and Server Selection for Multimedia Proxy Across Wireless Internet Qian Zhang Zhe Xiang Wenwu Zhu Lixin Gao IEEE Transactions.
A Survey of Web Cache Replacement Strategies Stefan Podlipnig, Laszlo Boszormenyl University Klagenfurt ACM Computing Surveys, December 2003 Presenter:
Base Station Operation and User Association Mechanisms For Energy- Delay Tradeoffs in Green Cellular Networks by Kyuho Son, Hongseok Kim, Yung Yi, Bhaskar.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Weight based Multicast Routing Protocol for Ad hoc Wireless Networks 學生:陳信皇 教授:陳仁暉.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Sleepers & Workaholics Caching Strategies in Mobile Computing Dr. Daniel Barbará Dr. Tomasz Imielinski.
Agent Caching in APHIDS CPSC 527 Computer Communication Protocols Project Presentation Presented By: Jake Wires and Abhishek Gupta.
Small-world Overlay P2P Network
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
1 CAPS: A Peer Data Sharing System for Load Mitigation in Cellular Data Networks Young-Bae Ko, Kang-Won Lee, Thyaga Nandagopal Presentation by Tony Sung,
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
SAIU: An Efficient Cache Replacement Policy for Wireless On-demand Broadcasts Jianliang Xu, Qinglong Hu, Dik Lun Department of Computer Science in HK University.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
An Intelligent Cache System with Hardware Prefetching for High Performance Jung-Hoon Lee; Seh-woong Jeong; Shin-Dug Kim; Weems, C.C. IEEE Transactions.
Client Cache Management Improving the broadcast for one probability access distribution will hurt the performance of other clients with different access.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 34 – Media Server (Part 3) Klara Nahrstedt Spring 2012.
Massively Distributed Database Systems Broadcasting - Data on air Spring 2014 Ki-Joune Li Pusan National University.
Enhanced power efficient sleep mode operation for IEEE e based WiMAX Shengqing Zhu, and Tianlei Wang IEEE Mobile WiMAX Symposium, 2007 IEEE Mobile.
CoPTUA: Consistent Policy Table Update Algorithm for TCAM without Locking Zhijun Wang, Hao Che, Mohan Kumar, Senior Member, IEEE, and Sajal K. Das.
Study on Power Saving for Cellular Digital Packet Data over a Random Error/Loss Channel Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
De-Nian Young Ming-Syan Chen IEEE Transactions on Mobile Computing Slide content thanks in part to Yu-Hsun Chen, University of Taiwan.
Efficient Peer to Peer Keyword Searching Nathan Gray.
PRESENTED BY A. B. C. 1 User Oriented Regional Registration- Based Mobile Multicast Service Management in Mobile IP Networks Ing-Ray Chen and Ding-Chau.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Optimal Selection of Power Saving Classes in IEEE e Lei Kong, Danny H.K. Tsang Department of Electronic and Computer Engineering Hong Kong University.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
Low Cost Commit Protocols for Mobile Computing Environments Marc Perron & Baochun Bai.
PRoPHET+: An Adaptive PRoPHET- Based Routing Protocol for Opportunistic Network Ting-Kai Huang, Chia-Keng Lee and Ling-Jyh Chen.
Mobile Data Access1 Replication, Caching, Prefetching and Hoarding for Mobile Computing.
1 Service Charge and Energy- Aware Vertical Handoff in Integrated IEEE e/ Networks Youngkyu Choi and Sunghyun Choi School of Electrical Engineering.
IETF78 Multimob Masstricht1 Proposal for Tuning IGMPv3/MLDv2 Protocol Behavior in Wireless and Mobile networks draft-wu-multimob-igmp-mld-tuning-02 Qin.
Copyright © 2011, Scalable and Energy-Efficient Broadcasting in Multi-hop Cluster-Based Wireless Sensor Networks Long Cheng ∗ †, Sajal K. Das†,
Client Cache Management Improving the broadcast for one probability access distribution will hurt the performance of other clients with different access.
An Energy Efficient MAC Protocol for Wireless LANs, E.-S. Jung and N.H. Vaidya, INFOCOM 2002, June 2002 吳豐州.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
ETE Framework for QoS guarantee in Heterogeneous Wired-cum-Wireless Networks (cont.) 홍 석 준
Data Scheduling for Multi-item and transactional Requests in On-demand Broadcast Nitin Pabhu Vijay Kumar MDM 2005.
Spectrum Sensing In Cognitive Radio Networks
BOUNDS ON QOS- CONSTRAINED ENERGY SAVINGS IN CELLULAR ACCESS NETWORKS WITH SLEEP MODES - Sushant Bhardwaj.
Efficient Resource Allocation for Wireless Multicast De-Nian Yang, Member, IEEE Ming-Syan Chen, Fellow, IEEE IEEE Transactions on Mobile Computing, April.
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Simulation of DeReClus Yingyue Xu September 6, 2003.
CPET 565 Mobile Computing Systems Data Dissemination and Management (2) Lecture 8 Hongli Luo Indiana University-Purdue University Fort Wayne.
Massively Distributed Database Systems Broadcasting - Data on air Spring 2015 Ki-Joune Li Pusan National University.
Project Summary Fair and High Throughput Cache Partitioning Scheme for CMPs Shibdas Bandyopadhyay Dept of CISE University of Florida.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
Video Caching in Radio Access network: Impact on Delay and Capacity
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Jiahao Chen, Yuhui Deng, Zhan Huang 1 ICA3PP2015: The 15th International Conference on Algorithms and Architectures for Parallel Processing. zhangjiajie,
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Achieving All the Time, Everywhere Access in Next- Generation Mobile Networks by Marcello Cinque, Domenico Cotroneo and Stefano Russo Presented by Ashok.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems - Weiping He, Ing-Ray Chen.
Feb 5, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Data Dissemination and Management 3 of 4 Lecture 8 Paul I-Hai Lin, Professor Electrical.
Chapter 25: Advanced Data Types and New Applications
Data Dissemination and Management (2) Lecture 10
CSE 4340/5349 Mobile Systems Engineering
CSE 4340/5349 Mobile Systems Engineering
Data Dissemination and Management (3)
Data Dissemination and Management (2) Lecture 10
Presentation transcript:

Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility Huaping Shen, Mohan Kumar, Sajal K. Das, and Zhijun Wang P 邱仁傑

Outline Scalable Asynchronous Cache Consistency Scheme (SACCS) Analytical Model for Utility GD-LU Cache Replacement Algorithm GD-LU Passive Prefetching Performance Evaluation

SACCS maintain data consistency for mobile computing systems. SACCS relies on three key features: (1) Use of flag bits at server and mobile device's cache to maintain cache consistency (2) Use of an identifier for each entry in mobile device's cache after its invalidation (3) Rendering of all valid entries of a mobile device's cache to uncertain state upon wake up. SACCS(1/6)

SACCS(2/6) SERVER: Each data item in a server is associated with a flag bit. When a data item is retrieved by a mobile device, the corresponding flag bit is set, indicating that a valid copy may be available in the mobile cache. When the data item is updated, the server immediately broadcasts its invalidation report (IR) to mobile devices and resets the flag bit.

SACCS(3/6) Mobile device: Each data item in the system is in one of three states: invalidated, certain and uncertain. The invalidated state is defined for data items that are not cached at the mobile device. The uncertain state is defined for data items that are cached at the mobile device, but validation of data items is not confirmed. The certain state is defined for the data items whose validation is confirmed and can be used to satisfy the application's data request.

SACCS(4/6) A mobile device is either in an awake or in a sleep state In the awake state (i.e., connected with base station (BS)), mobile device receives the IR It discard the corresponding data items It keep the metadata information (including ID) in local cache. The data items contained in IR will change their status to the invalidated state.

SACCS(5/6) In the sleep state Disconnection :If mobile devices reconnect to wireless networks from base station Handoff: they move to another cell Upon wake up,mobile devices set all data items in the cache into uncertain state. An uncertain entry must be refreshed or checked before its usage.

SACCS(6/6) If applications request an item that is in uncertain state An uncertain request message is initialized and sent to the base station. The base station maintains the item state for each mobile cache The base station responds with a confirmation message if the data item has not been updated since the mobile last acquired it, otherwise, the whole data item is sent to the mobile. After receiving confirmation message from base station, the uncertain cached data items will change to certain state.

Analytical Model for Utility(1/12) We assume that data request of mobile applications, data update at the server, mobility handoff and disconnection of mobile devices follow Poisson processes. The following analysis assumes a unicast communication between base station and mobile devices.

Analytical Model for Utility(2/12) The notations used in the analysis are listed below:

Analytical Model for Utility(3/12) The state transitions of each cached data item di in the system between nth and (n + 1)th data requests. Event EV1 : it occurs when the mobile device does not receive any IR for di and therefore di remains in the uncertain state. Event EV2 :The item di moves to invalidate state when an IR for di is received. Event EV3 : it occurs if both the following conditions are satisfied: mobile device does not receive any IR for di, and no handoff and disconnection occur. Event EV4 is the event that changes di from certain to uncertain state, if one handoff or disconnection occurs. Event EV5 stands for the event that di changes to invalidated state from certain state, if there is at least one IR for di received by the mobile device.

Analytical Model for Utility(4/12)

Analytical Model for Utility(5/12) Since we assume that the arrivals of data request, data update, disconnection and handoff are all Poisson processes, the corresponding probability Pi of each event EVi (for 1 · i · 5) is given by Equations (1)-(5).

Analytical Model for Utility(6/12) Energy consumed by any mobile device for sending, receiving or discarding a message is given by the following linear equation where s is the message size, and m denotes the incremental energy cost associated with message, h is the energy cost for the overhead of message. The latter two parameters, i.e., m and h, are different for sending and receiving.

Analytical Model for Utility(7/12) The energy cost ( ) of the mobile device's request for an uncertain data item is given by,

Analytical Model for Utility(8/12) The energy cost ( ) of the mobile device's request for an certain data item is given by,

Analytical Model for Utility(9/12) At the (n+1)th request, the cache mechanism needs to choose victim data set from certain and uncertain data sets in the cache to make space for an incoming data item dx. where is victim data set chosen from the uncertain data set and is victim data set chosen from the certain data set.

Analytical Model for Utility(10/12) The energy cost after the (n+1)th request can be expressed in a recursive way as follows: The objective of our replacement policy is to choose the optimal victim data set from the cache to minimize the energy cost after the (n+1)th request. The second term is the increased energy cost as dx is cached at the (n + 1)th request, i.e., dx changes from invalidated state to certain state. The cache mechanism can not change the first two terms

Analytical Model for Utility(11/12) The last two terms can be minimized as follows:

Analytical Model for Utility(12/12) In order to minimize the energy cost at mobile devices, at each replacement, we choose the data items with the least utility values according to Equations (8) and (9).

GD-LU Cache Replacement Algorithm(1/2)

GD-LU Cache Replacement Algorithm(2/2)

GD-LU Passive Prefetching Algorithm(1/2) For broadcast and multicast communications, the data item requested by one mobile device is available for all other mobile devices in the data dissemination channel. A data item whose metadata are kept in the metadata queue may have a higher probability to be requested again by the mobile device, We define relative utility (RU) to evaluate future utility of an item at the mobile device. where C is the set of data items in cache, and uj is the utility value of cached data item j.

GD-LU Passive Prefetching Algorithm(2/2)

Complexity Analysis GD-LU mechanism : it uses a priority queue of the data items based on their utility values. Handling a cache hit takes O(logN) time where N is the number of data items in the cache. Handling an eviction also requires O(logN) time. Passive prefetching algorithm : due to a priority queue management, the it also has a time complexity of O(logN).

Performance Metrics hit ratio (HR) The metric power per query (PPQ) is defined as the ratio of the total energy consumed by data requests to the number of requests in a given period. stretch (ST) is defined as the ratio of the response time of a request to its service time, where service time is defined as the ratio of the requested item size to the bandwidth. energy stretch (EST) is defined as the product of stretch and the energy consumption of a data request. Clearly, energy stretch refects a performance tradeoff between energy consumption and access latency.

Simulation Results GD-LU replacement algorithm and compare it with LRU GD-Size(1) sets the cost for each document to 1 GD-Size(packets) sets the cost for each document to 2+size=536 Min-SAUD under SACCS scheme, we set the cache validation delay (v) as zero for valid data items and set v as the confirmation delay for uncertain data items as we calculate the gain function of Min-SAUD

GD-LU Passive Prefetching

Blind prefetching.

GD-LU Passive Prefetching

We consider EST as the main performance metric for passive prefetching, we can get an optimal value of threshold.

GD-LU Passive Prefetching We choose the points with minimal energy stretch (Min EST) from Figure 8 as comparison, the energy stretch performance of median utility threshold setting (MU EST) achieves near optimal performance under different cache sizes. This demonstrates that the median relative utility threshold setting is a good heuristic method to achieve optimal performance tradeoff between energy consumption and access latency.

GD-LU Replacement: Effect of Cache Size We ignore passive prefetching scheme in this experiment The goal of Min-SAUD is to improve the stretch performance, data items with small size are preferred since smaller size data items contribute more to the stretch performance. GD-LU endeavors to achieve optimal energy conservation, therefore, the data items that consume more energy are selected to be cached.

GD-LU Replacement: Effect of Cache Size

GD-LU Replacement: Effect of data update rate IR listening dominates the energy consumption for mobile devices.

GD-LU Replacement: Effect of data update rate

GD-LU Replacement: Effect of disconnection frequency This is because the utility function deployed in GD-LU considers connection-disconnection characteristic of mobile devices. A small value of Ts indicates a high disconnection frequency

GD-LU Replacement: Effect of disconnection frequency