Service Management in PCN Systems

Size: px
Start display at page:

Download "Service Management in PCN Systems"

Transcription

1 Lecture 2: Service and Data Management Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Fall 2005 Courtesy of G.G. Richard III for providing some of the slides for this chapter 1 Service Management in PCN Systems Managing services in mobile environments Server VLR VLR How does the server find new VLR? Too much overhead in contacting HLR 2 1

2 PCN Systems: Proxy-Based Solution Per-User Service Proxy Server Proxy Client 3 Per-User Service Proxy Service Proxy Maintains service context Information Forwards client requests to servers Forwards server replies to clients Tracks the location of the MU, thereby reducing communication costs 4 2

3 Static Service Proxy Proxy is located at a fixed location Inefficient data route delivery Server Client Proxy 5 Mobile Service Proxy Proxy could move with the client if necessary Proxy informs servers of location changes Server Proxy/ Client Proxy/ Client Proxy/ Client 6 3

4 Location/Service Management Decoupled Model Traditionally, service and location management are decoupled HLR / VLR Proxy Client 7 Integrated Location and Service Management Per-user based proxy services Service proxy co-locates (and moves) with the MU s location database Four possible schemes: Centralized, fully distributed, dynamic anchor and static anchor schemes 8 4

5 Integrated: Centralized Scheme The proxy is centralized and colocated with the HLR to minimize communication costs with HLR to track MU When MU moves to a different VLR, a location update operation incurs to the HLR/proxy Data delivery/call incurs a search operation at the HLR/proxy to locate the MU Data service route: Server -> proxy/hlr -> MU 9 Integrated: Fully Distributed Scheme Location and service handoffs occur when MU moves to a new VLR Service proxy co-locates (moves) with the location database at the current VLR The proxy s moving to new VLR causes a location update to the HLR/server, and a context transfer A call requires a search operation at the HLR to locate the MU Data service route: Server -> proxy/mu 10 5

6 Integrated: Static Anchor Scheme VLRs are grouped into anchor areas HLR points to the current anchor Proxy is co-located with anchor in a fixed location until MU moves to anchor area Intra-anchor movement Anchor/proxy is not moved and location update is sent to the anchor without updating the HLR Inter-anchor movement Anchor/proxy is moved with a context transfer cost and location update is send to the HLR/servers Data/Call delivery performs a search at the HLR to locate the current anchor and then MU Service route: Server->proxy/anchor -> MU 11 Integrated: Dynamic Anchor Scheme Same as static anchor except that the anchor/proxy moves to the current VLR when there is a call delivery On a call delivery A search to the HLR is performed If the anchor is not the current serving VLR Move anchor/proxy; information HLR/server of address change; and perform context transfer Service route: server->proxy/anchor- >MU Advantageous than static anchor when CMR and SMR are high 12 6

7 λ σ γ CMR SMR T τ 1 τ 2 τ 3 M cs N s P InA P OutA call to mobility ratio, e.g., λ / σ. Model Parameters the average rate at which the MU is being called. the average rate at which the MU moves across VLR boundaries. the average rate at which the MU requests services. service request to mobility ratio, e.g., γ / σ. the average round trip communication cost between a VLR and the HLR (or between a VLR and the server) per message. the average round trip communication cost between the anchor and a VLR in an anchor area per message. the average round trip communication cost between two neighboring VLRs in an anchor areas per message. the average round trip communication cost between two neighboring VLRs per message. the number of packets required to transfer the service context. the number of server applications concurrently engaged by the MU. the probability that a MU moves within the same anchor area when a VLR boundary crossing movement occurs. the probability that a MU moves out of the current anchor area when a VLR 13 Cost Model Performance metric total communication cost per time unit: C total = Cupdate * σ + Csearch * λ + Cservice * γ 3 basic operations Location update ( C update ) cost for updating the location of MU and service proxy (sometimes, service context transfer) Call delivery ( C search ) cost for locating a MU to deliver a call Data service requests ( C service ) cost for MU to communicate with server through proxy 14 7

8 Costs for Centralized and Fully Distributed Schemes Scheme/Cost Location update Call delivery Service request Centralized Distributed C update = T Cost to inform the location database at the HLR of the new VLR Cupdate = T + M cs *τ 3 + N st T :cost to inform the HLR of the new VLR M cs *τ 3 :cost to transfer service context between two neighboring VLRs for the proxy move N s T :cost to update Ns application servers with new location of MU C search = T Cost to locate the MU and deliver the call from the HLR to VLR C search = T Cost to locate the MU and deliver the call C service = T + T Round trip cost from MU to proxy and from proxy to server C service = T Cost from the service proxy colocated at the current VLR to the server 15 Performance Evaluation-Results Cost rate under different CMR and SMR values 16 8

9 Cost Rate Performance Evaluation-Results Centralized Fully distributed Dynamic anchor Static anchor CMR Cost rate under different CMR values Mobility rate fixed at 10 changes /hour; SMR = 1 to study the effect of varying CMR Low CMR Static/Dynamic Anchor perform better than centralized and fully distributed High CMR Centralized is the best. Dynamic anchor is better than static anchor. The reason is that dynamic anchor updates the HLR and moves the anchor to the current VLR, thereby reducing service request costs and location 17 update costs Cost Rate Performance Evaluation-Results Centralized Fully distributed Dynamic anchor Static anchor SMR Cost rate under different SMR values Mobility rate is fixed at 10 changes/hour CMR = 1 to study the effect of SMR on cost rate Low SMR Fully distributed scheme is the worst due to frequent movement of service proxy with mobility High SMR Fully distributed scheme performs the best since the service proxy is co-located with the current VLR to lower the triangular cost 18 9

10 Cost Rate Performance Evaluation Results Decoupled Schemes Integrated Schemes IS SMR Comparison of integrated with decoupled scheme Depending on the user s SMR the best integrated scheme and decoupled scheme were compared Integrated scheme converges with the decoupled scheme at high SMR where the influence of mobility is less Integrated scheme is better than the basic scheme at high SMR due to triangular cost between the server and MU via HLR 19 Integrated Location and Service Management in PCS: Conclusions Design Concept: Position the service proxy along with the location database of the MU Centralized scheme: Suited for low SMR and high CMR Distributed scheme: Best at high SMR and high CMR Dynamic anchor scheme: Works best for a wide range of CMR and SMR values except when service context transfer costs are high Static anchor scheme: Works reasonably well for a wide range of CMR and SMR values The best location/service integrated scheme always outperforms the best decoupled scheme, and the basic scheme 20 10

11 Communications Asymmetry in Mobile Wireless Environments Network asymmetry In many cases, downlink bandwidth far exceeds uplink bandwidth Client-to-server ratio Large client population, but few servers Data volume Small requests, large responses Downlink bandwidth more important Update-oriented communication Updates likely affect a number of clients 21 Disseminating Data to Wireless Hosts Broadcast-oriented dissemination makes sense for many applications Can be one-way or with feedback Sports Stock prices New software releases (e.g., Netscape) Chess matches Music Election Coverage Weather/traffic 22 11

12 Dissemination: Pull Pull-oriented dissemination can run into trouble when demand is extremely high Web servers crash Bandwidth is exhausted client client client client server client client help client 23 Dissemination: Push Server pushes data to clients No need to ask for data Ideal for broadcast-based media (wireless) client client client client server client client Whew! client 24 12

13 Broadcast Disks server 5 6 Schedule of data blocks to be transmitted 25 Broadcast Disks: Scheduling Round Robin Schedule Priority Schedule

14 Priority Scheduling (2) Random Randomize broadcast schedule Broadcast "hotter" items more frequently Periodic Allows mobile hosts to sleep Create a schedule that broadcasts hotter items more frequently but schedule is fixed "Broadcast Disks: Data Management " paper uses this approach Simplifying assumptions Data is read-only Schedule is computed and doesn't change Means access patterns are assumed the same 27 "Broadcast Disks: Data Management " Order pages from "hottest" to coldest Partition into ranges ("disks") pages in a range have similar access probabilities Choose broadcast frequency for each "disk" Split each disk into "chunks" maxchunks = LCM(relative frequencies) numchunks(j) = maxchunks / relativefreq(j) Broadcast program is then: for I = 0 to maxchunks - 1 for J = 1 to numdisks Broadcast( C(J, I mod numchunks(j) ) 28 14

15 Sample Schedule, From Paper Relative frequencies Hot For You Ain't Hot for Me Hottest data items are not necessarily the ones most frequently accessed by a particular client Access patterns may have changed Higher priority may be given to other clients Might be the only client that considers this data important Thus: need to consider not only probability of access (standard caching), but also broadcast frequency Observation: Hot items are more likely to be cached! 30 15

16 Broadcast Disks Paper: Caching Under traditional caching schemes, usually want to cache "hottest" data What to cache with broadcast disks? Hottest? Probably not that data will come around soon! Coldest? Ummmm not necessarily Cache data with access probability significantly higher than broadcast frequency 31 Caching PIX algorithm (Acharya) Eject the page from local cache with the smallest value of: probability of access broadcast frequency Means that pages that are more frequently accessed may be ejected if they are expected to be broadcast frequently 32 16

17 Hybrid Push/Pull Balancing Push and Pull for Data Broadcast B = B 0 + B b B 0 is bandwidth dedicated to on-demand pull-oriented requests from clients B b is bandwidth allocated to broadcast B 0 =0% "pure" Push Clients needing a page simply wait B 0 =100% Schedule is totally request-based 33 Optimal Bandwidth Allocation between On Demand and Broadcast Assume there are n data items, each of size S Each packet is of size R The average time for the sever to service an on-demand request is D=(S+R)/B 0 ; let µ=1/d be the service rate Each client generates requests at an average rate of r There are m clients, so cumulative request rate is λ=m*r For on-demand requests, the average response time per request is T 0 =(1+queue length)*d where queue length is given by utilization/(1-utilization) with utilization being defined as λ/µ (ref: queueing theory for M/M/1 - take CS 5214 to be offered in Spring 2006) 34 17

18 Optimal Bandwidth Allocation between On Demand and Broadcast What are the best frequencies for broadcasting data items? Imielinski and Viswanathan showed that if there are n data items with popularity ratio p 1, p 2,, p n, they should be broadcast with frequencies f 1, f 2,, f n, where f i = sqrt(p i )/[sqrt(p 1 )+sqrt(p 2 ) +sqrt(p n )] in order to minimize the average latency T b for accessing a broadcast data item. 35 Optimal Bandwidth Allocation between On Demand and Broadcast T=T b + T o is the average time to access a data item Imielinski and Viswanathan s algorithm: Assign D 1, D 2,, D i to broadcast channel Assign D i+1, D i+2,, D n to on-demand channel Determine optimal B b, B o to minimize T=T b + T o : Compute T o by modeling on-demand channel as M/M/1 (or M/D/1) Compute T b by using the optimal frequencies f 1, f 2,, f n Compute optimal B b which minimizes T to within an acceptable threshold L 36 18

19 Mobile Caching: General Issues Mobile user/application issues: Data access pattern (reads vs. writes?) Data update rate Communication/access cost Mobility pattern of the client Connectivity characteristics disconnection frequency available bandwidth Data freshness requirements of the user Context dependence of the information 37 Pertaining To Mobile Computing Mobile Caching (2) Research questions: How can client-side latency be reduced? How can consistency be maintained among all caches and the server(s)? How can we ensure high data availability in the presence of frequent disconnections? How can we achieve high energy/bandwidth efficiency? How to determine the cost of a cache miss and how to incorporate this cost in the cache management scheme? How to manage location-dependent data in the cache? How to enable cooperation between multiple peer caches? 38 19

20 Mobile Caching (3) Cache organization issues: Where do we cache? (client? proxy? service?) How many levels of caching do we use (in the case of hierarchical caching architectures)? What do we cache (i.e., when do we cache a data item and for how long)? How do we invalidate cached items? Who is responsible for invalidations? What is the granularity at which the invalidation is done? What data currency guarantees can the system provide to users? What are the (real $$$) costs involved? How do we charge users? What is the effect on query delay (response time) and system throughput (query completion rate)? 39 Weak vs. Strong Consistency Strong consistency Value read is most current value in system Invalidation on each write Disconnections may cause loss of invalidation messages Can also poll on every access Impossible to poll if disconnected! Weak consistency Value read may be somewhat out of date TTL (time to live) associated with each value Can combine TTL with polling e.g., Polling to update TTL or retrieval of new copy of data item if out of date 40 20

21 Invalidation Report for Strong Cache Consistency Stateless: Server does not maintain information about the cache content of the clients Synchronous: An invalidation report is broadcast periodically, e.g., Broadcast Timestamp Scheme Asynchronous: reports are sent on data modification Property: Client cannot miss an update (say because of sleep or disconnection); otherwise, it will need to discard the entire cache content Stateful: Server keeps track of the cache contents of its clients Synchronous: none Asynchronous: A proxy is used for each client to maintain state information for items cached by the client and their last modification times; invalidation messages are sent to the proxy asynchronously. Clients can miss updates and get sync with the proxy (agent) upon reconnection 41 Asynchronous Stateful (AS) Scheme Whenever the server updates any data item, an invalidation report message is sent to the MH s HA via the wired line. A home location cache (HLC) is being maintained in the HA to keep track of data having been cached by the MH. The HLC is a list of records (x,t,invalid_flag) for each data item x locally cached at MH where x is the data item ID and T is the timestamp of the last invalidation of x Invalidation reports are transmitted asynchronously and are buffered at the HA until explicit acknowledgment is received from the specific MH. The invalid_flag is set to true for data items for which an invalidation message has been sent to the MH but no acknowledgment is received Before answering queries from application, the MH verifies whether a requested data item is in a consistent state. If it is valid, it will satisfy the query; otherwise, an 42 uplink request to the HA is issued. 21

22 Asynchronous Stateful (AS) Scheme When MH receives an invalidation message from HA, it discards that data item from the cache Each client maintains a cache timestamp indicating the timestamp of the last message received by the MH from the HA. HA discards any invalidation messages from the HLC with the timestamp less than or equal to the cache timestamp t received from MH and only sends invalidation messages with timestamp greater than t In the sleep mode, the MH is unable to receive any invalidation message When a MH reconnects, it sends a probe message to its HA with its cache timestamp upon receiving a query. In response to this probe message, the HA sends an invalidation report. The AS scheme can handle arbitrary sleep patterns of 43 the MH. Asynchronous Stateful Scheme Broadcasting Timestamp Scheme (Synchronous Stateless) 44 A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 22

23 Analysis of AS Scheme Goal: Cache miss probability Mean query delay Model constraints: A single Mobile Switching Station (MSS) with N mobile hosts 45 Assumptions M data items, each of size b a bits No queuing of queries when MH is disconnected Single wireless channel of bandwidth C All messages are queued and serviced FCFS A query is of size b q bits An invalidations is of size b i bits Processing overhead is ignored 46 23

24 MH Queries Queries follow a Poisson distribution with mean rate λ Queries are uniformly distributed over all items M in the database P( N( t) = n) = n ( λt) λt n! e 47 Data Item Updates Time between two consecutive updates to a data item is exponentially distributed with rate µ 48 24

25 MH states Mobile hosts alternate between sleep and awake modes s is the fraction of time in sleep mode; 0 s 1 ω is rate at which state changes (sleeping or awake), i.e., the time t between two consecutive wake ups is exponentially distributed with rate ω 49 A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 50 25

26 Hit ratio estimation λ e = (1 s) λ = effective rate of query generation Queries are uniformly distributed over M items in the database Per-data item (say x) query rate: λ x = λ e /M = [(1 s) λ/m] 51 Hit rate estimation Queries for a specific data item x by a MH would be a miss in the local cache (which would require an uplink request) in either of two conditions: [Event 1] During time t, item x has been invalidated at least once [Event 2] Data item x has not been invalidated during time t, but MH has slept at least once during t 52 26

27 t-t1 t A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 53 P[Event 1] = Calculating P [Event 1] t λ xt ( λxe ) µ e µ x µ Mµ dx dt = = λx + µ (1 s λ + Mµ 0 0 ) Probability density function of a query for x at time t Probability of invalidation in time [0,t] 54 27

28 PDF of state change occurs at t1 Calculating P [Event 2] P[Event 2] = t λxt µ t λxt1 ωt1 ω ( t t1 ) ( λ e e ) e ωe ( 1 e ) x 0 0 dt dt 1 PDF of query for x at time t Probability of no invalidation in time [0,t] Probability of no query in time [t-t 1, t] Probability of at least one sleep occurred in [0, t-t 1 ] 55 P[Event 2] = t λxt µ t λxt1 ωt1 ω ( t t1 ) ( λ e e ) e ωe ( 1 e ) x 0 0 dt dt 1 = ωλx λ e λ e ω + λ ( ω + λ ) µ + λ µ + λ + ω µ + λ + ω e x x 2 x e + ω 56 28

29 P miss and P hit P miss = P[Event 1] + P[Event 2] P hit = 1 - P miss 57 Mean Query Delay Let T delay be the mean query delay, then T delay = P hit *0 + P miss T q = P miss T q where T q is the uplink query delay Model up-link queries as M/D/1 queue (assuming there is a dedicated up-link channel of bandwidth C) Model invalidations on down-link channel as M/D/1 queue (assuming there is a dedicated down-link channel of bandwidth C) 58 29

30 N MHs in cell Uplink query generation rate Query service rate A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 59 Mean invalidation message arrival rate Invalidation service rate A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 60 30

31 Effective arrival rate of invalidation messages Query service rate A. Kahol, S. Khurana, S. K. S. Gupta, P. K. Srimani, An Efficient Cache Maintenance Scheme for Mobile Environment 61 Mean Query Delay Estimation Combine M/D/1 queues Average delay by an uplink query Resultant mean query delay T delay = P miss T q T q ~ 2µ q λq + λi = ~ 2µ q µ q λq + λi 62 31

32 Disconnected Operation Disconnected operation is very desirable for mobile units Idea: Attempt to cache/hoard data so that when disconnections occur, work (or play) can continue Major issues: What data items (files) do we hoard? When and how often do we perform hoarding? How do we deal with cache misses? How do we reconcile the cached version of the data item with the version at the server? 63 States of Operation Data Hoarding Reintegration Disconnected 64 32

33 Case Study: Coda Coda: file system developed at CMU that supports disconnected operation Cache/hoard files and resolve needed updates upon reconnection Replicate servers to improve availability What data items (files) do we hoard? User selects and prioritizes Hoard walking ensures that cache contains the most important stuff When and how often do we perform hoarding? Often, when connected 65 Coda (2) How do we deal with cache misses? If disconnected, cannot How do we reconcile the cached version of the data item with the version at the server? When connection is possible, can check before updating When disconnected, use local copies Upon reconnection, resolve updates If there are hard conflicts, user must intervene (e.g., it s manual requires a human brain) Coda reduces the cost of checking items for consistency by grouping them into volumes If a file within one of these groups is modified, then the volume is marked modified and individual files within can be checked 66 33

34 To Cache or Not? Compare static allocation always cache (SA-always), never cache (SA-never), vs. dynamic allocation (DA) Cost model: Each rm (read at mobile) costs 1 unit if the mobile does not have a copy; otherwise the cost is 0 Each ws (write at server) costs 1 unit if the mobile has a copy; otherwise the cost is 0 A schedule of (ws, rm, rm, ws) SA-always: Cost is =2 SA-never: Cost is = 2 DA which allocates the item to the mobile after the first ws operation and deallocates after second rm operation: Cost is 0 + allocation/deallocation cost = (for allocation) + 1 (deallocation) = 2 A schedule of m ws operations followed by n rm operations? Cost=m (always) vs. n (never) vs. 1 (DA) 67 To Cache or Not? Sliding Window Dynamic Allocation Algorithm A dynamic sliding-window allocation scheme SW[k] maintains the last k relevant operations and makes the allocation or deallocation decision after each relevant operation Requiring the mobile client to be always connected to maintain the history information Case Data item is not cached at the mobile node If the window has more rm operations than ws operations, then allocate the data item at the mobile node Case Data item is cached at the mobile node If the window has more ws operations than rm operations, then deallocate the data item from the mobile node Competitive w.r.t. the optimal offline algorithm 68 34

35 Web Caching: Case Study - WebExpress Housel, B. C., Samaras, G., and Lindquist, D. B., WebExpress: A Client/Intercept Based System for Optimizing Web Browsing in a Wireless Environment, Mobile Networks and Applications 3: , System intercepts web browsing, providing sophisticated caching and bandwidth saving optimizations for web activity in mobile environments Major features: Low bandwidth in wireless networks Caching Based on TTL-based cache consistency When TTL expires, check if an object has been updated by using the CRC of an object Verbosity of HTTP protocol Perform Protocol Reduction TCP connection setup time Try to re-use a single TCP connection Many responses from web servers are very similar to those seen previously Use differencing rather than returning complete responses, particularly for CGI-based interactions 69 WebExpress (2) A Single TCP connection Reduce redundant HTTP header info Reinsert removed HTTP header info on server side Caching on both client and on wired network + differencing Two intercepts (proxies): one on the client side and one on the server side 70 35

36 References 1. I.R. Chen, B. Gu and S.T. Cheng, On integrated location and service handoff schemes for reducing network cost in personal communication systems, IEEE Transactions on Mobile Computing, A. Kahol, S. Khurana, S.K.S. Gupta and P.K. Srimani, A strategy to manage cache consistency in a disconnected distributed environment, IEEE Trans. on Parallel and Distributed Systems, Vol. 12. No. 7, July 2001, pp Chapter 3, F. Adelstein, S.K.S. Gupta, G.G. Richard III and L. Schwiebert, Fundamentals of Mobile and Pervasive Computing, McGraw Hill, 2005, ISBN:

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment

A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Shumei Chen Hoang Nguyen Jeff Wilson Team Members

More information

CPET 565/CPET 499 Mobile Computing Systems. Lecture 8. Data Dissemination and Management. 2 of 3

CPET 565/CPET 499 Mobile Computing Systems. Lecture 8. Data Dissemination and Management. 2 of 3 CPET 565/CPET 499 Mobile Computing Systems Lecture 8 and Management 2 of 3 Based on the Text used in the course: Fundamentals of Mobile & Pervasive Computing, 2005, by Frank Adelstein, et. al, from McGraw-Hill

More information

4. Data Transmitting Agent based strategy for

4. Data Transmitting Agent based strategy for 120 Chapter 4 4. Data Transmitting Agent based strategy for Effective Cache Consistency 4.1 Architecture of Multicast-Data Dissemination Model Using Data Transmitting Agent The architecture of a mobile

More information

FUTURE personal communications service (PCS) networks

FUTURE personal communications service (PCS) networks IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 2, FEBRUARY 2006 1 On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems Ing-Ray Chen, Member, IEEE

More information

A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment

A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Department of Computer Science Colorado State

More information

On Improving the Performance of Cache Invalidation in Mobile Environments

On Improving the Performance of Cache Invalidation in Mobile Environments Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO

More information

Dynamic Cache Consistency Schemes for Wireless Cellular Networks

Dynamic Cache Consistency Schemes for Wireless Cellular Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., FEBRUARY 00 Dynamic Cache Consistency Schemes for Wireless Cellular Networks Zhijun Wang, Mohan Kumar, Sajal K Das, and Huaping Shen Abstract

More information

Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems

Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems Mobile Networks and Applications 0, 45 46, 005 C 005 Springer Science + Business Media, Inc. Manufactured in The Netherlands. Performance Analysis of Location-Aware Mobile Service Proxies for Reducing

More information

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment

Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University

More information

APPCCM: Adaptive Per-User Per-Object Cache Consistency Management for Mobile Client-Server Applications in Wireless Mesh Networks

APPCCM: Adaptive Per-User Per-Object Cache Consistency Management for Mobile Client-Server Applications in Wireless Mesh Networks APPCCM: Adaptive Per-User Per-Object Cache Consistency Management for Mobile Client-Server Applications in Wireless Mesh Networks Yinan Li, Ing-Ray Chen Department of Computer Science Virginia Polytechnic

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks

Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks Design and Performance Analysis of Mobility Management Schemes based on Pointer Forwarding for Wireless Mesh Networks Yinan Li, Ing-Ray Chen, Member, IEEE Abstract We propose efficient mobility management

More information

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments

Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Oxford University Press 2007. All rights reserved. 1 Access Latency in mobile environment A device needs a data-record

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

Energy-Efficient Mobile Cache Invalidation

Energy-Efficient Mobile Cache Invalidation Distributed and Parallel Databases 6, 351 372 (1998) c 1998 Kluwer Academic Publishers. Manufactured in The Netherlands. Energy-Efficient Mobile Cache Invalidation KUN-LUNG WU, PHILIP S. YU AND MING-SYAN

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Mobility Management (cont.)

Mobility Management (cont.) CPET 565/CPET 499 Mobile Computing Systems Lecture 5 Mobility Management of Based on the Text used in the course: Fundamentals of Mobile & Pervasive Computing, 005, by Frank Adelstein, et. al, from McGraw-Hill

More information

Stretch-Optimal Scheduling for On-Demand Data Broadcasts

Stretch-Optimal Scheduling for On-Demand Data Broadcasts Stretch-Optimal Scheduling for On-Demand Data roadcasts Yiqiong Wu and Guohong Cao Department of Computer Science & Engineering The Pennsylvania State University, University Park, PA 6 E-mail: fywu,gcaog@cse.psu.edu

More information

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading

Mobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

A Strategy to Manage Cache Consistency in a Disconnected Distributed Environment

A Strategy to Manage Cache Consistency in a Disconnected Distributed Environment 686 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 12, NO. 7, JULY 2001 A Strategy to Manage Cache Consistency in a Disconnected Distributed Environment Anurag Kahol, Sumit Khurana, Sandeep

More information

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks

A New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery

More information

MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS

MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS MOBILITY AND SERVICE MANAGEMENT FOR FUTURE ALL-IP BASED WIRELESS NETWORKS Weiping He Preliminary Research Document submitted to the Faculty of the Virginia Polytechnic Institute and State University in

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ

Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ Autonomous Transaction Processing Using Data Dependency in Mobile Environments Λ IlYoung Chung, 1y Bharat Bhargava, 1 Malika Mahoui, 2 and Leszek Lilien 1 1 Department of Computer Sciences and Center for

More information

ECS-087: Mobile Computing

ECS-087: Mobile Computing ECS-087: Mobile Computing TCP over wireless TCP and mobility Most of the Slides borrowed from Prof. Sridhar Iyer s lecture IIT Bombay Diwakar Yagyasen 1 Effect of Mobility on Protocol Stack Application:

More information

CS514: Intermediate Course in Computer Systems

CS514: Intermediate Course in Computer Systems : Intermediate Course in Computer Systems Lecture 23: March 12, 2003 Challenges of Mobility Mobility is a huge topic Breaks existing applications Anything bandwidth intensive or synchronous Opportunities

More information

Simulating a General Purpose Mobile Computing Environment

Simulating a General Purpose Mobile Computing Environment Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University

More information

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT

WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT International Journal of Computer Networks & Communications (IJCNC) Vol.6, No.4, July 014 WEB OBJECT SIZE SATISFYING MEAN WAITING TIME IN MULTIPLE ACCESS ENVIRONMENT Y. J. Lee Department of Technology

More information

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT

BRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT - 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic

More information

ETSN01 Exam Solutions

ETSN01 Exam Solutions ETSN01 Exam Solutions March 014 Question 1 (a) See p17 of the cellular systems slides for a diagram and the full procedure. The main points here were that the HLR needs to be queried to determine the location

More information

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam

Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam Authors: Md. Mohsin Ali* Md. Amjad Hossain Md. Kowsar Hossain G. M. Mashrur-E-Elahi Md. Asadul Islam www.kuet.ac.bd Khulna University of Engineering & Technology (KUET) 2 Introduction Components of Wireless

More information

Hierarchical Agent-Based Secure and Reliable Multicast in Wireless Mesh Networks

Hierarchical Agent-Based Secure and Reliable Multicast in Wireless Mesh Networks Hierarchical Agent-Based Secure and Reliable Multicast in Wireless Mesh Networks Yinan Li, Ing-Ray Chen Abstract We propose and analyze a hierarchical agent-based secure and reliable multicast (HASRM)

More information

Parallel Databases C H A P T E R18. Practice Exercises

Parallel Databases C H A P T E R18. Practice Exercises C H A P T E R18 Parallel Databases Practice Exercises 181 In a range selection on a range-partitioned attribute, it is possible that only one disk may need to be accessed Describe the benefits and drawbacks

More information

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment

Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment Journal of Computer Science 7 (3): 374-378, 2011 ISSN 1549-3636 2011 Science Publications Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment 1 J.C. Miraclin Joyce Pamila

More information

Modelling and Analysis of Push Caching

Modelling and Analysis of Push Caching Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,

More information

Efficient Remote Data Access in a Mobile Computing Environment

Efficient Remote Data Access in a Mobile Computing Environment This paper appears in the ICPP 2000 Workshop on Pervasive Computing Efficient Remote Data Access in a Mobile Computing Environment Laura Bright Louiqa Raschid University of Maryland College Park, MD 20742

More information

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien

CERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien CERIAS Tech Report 2003-56 Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien Center for Education and Research Information Assurance

More information

Data Center Performance

Data Center Performance Data Center Performance George Porter CSE 124 Feb 15, 2017 *Includes material taken from Barroso et al., 2013, UCSD 222a, and Cedric Lam and Hong Liu (Google) Part 1: Partitioning work across many servers

More information

THE falling cost of both communication and mobile

THE falling cost of both communication and mobile IEEE TANSACTIONS ON KNOWLEDGE AND DATA ENGINEEING, VOL. 15, NO. 5, SEPTEMBE/OCTOBE 2003 1251 A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments Guohong Cao, Member, IEEE Abstract

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007)

Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Wireless Networks (CSC-7602) Lecture 8 (15 Oct. 2007) Seung-Jong Park (Jay) http://www.csc.lsu.edu/~sjpark 1 Today Wireline Fair Schedulling Why? Ideal algorithm Practical algorithms Wireless Fair Scheduling

More information

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks

Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Adaptive Local Route Optimization in Hierarchical Mobile IPv6 Networks Sangheon Pack, Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea

More information

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]

Mobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8] 192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

Computation of Multiple Node Disjoint Paths

Computation of Multiple Node Disjoint Paths Chapter 5 Computation of Multiple Node Disjoint Paths 5.1 Introduction In recent years, on demand routing protocols have attained more attention in mobile Ad Hoc networks as compared to other routing schemes

More information

Dynamic Metadata Management for Petabyte-scale File Systems

Dynamic Metadata Management for Petabyte-scale File Systems Dynamic Metadata Management for Petabyte-scale File Systems Sage Weil Kristal T. Pollack, Scott A. Brandt, Ethan L. Miller UC Santa Cruz November 1, 2006 Presented by Jae Geuk, Kim System Overview Petabytes

More information

End-To-End Delay Optimization in Wireless Sensor Network (WSN)

End-To-End Delay Optimization in Wireless Sensor Network (WSN) Shweta K. Kanhere 1, Mahesh Goudar 2, Vijay M. Wadhai 3 1,2 Dept. of Electronics Engineering Maharashtra Academy of Engineering, Alandi (D), Pune, India 3 MITCOE Pune, India E-mail: shweta.kanhere@gmail.com,

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University

CS555: Distributed Systems [Fall 2017] Dept. Of Computer Science, Colorado State University CS 555: DISTRIBUTED SYSTEMS [MESSAGING SYSTEMS] Shrideep Pallickara Computer Science Colorado State University Frequently asked questions from the previous class survey Distributed Servers Security risks

More information

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005

MoB: A Mobile Bazaar for Wide Area Wireless Services. R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 MoB: A Mobile Bazaar for Wide Area Wireless Services R.Chakravorty, S.Agarwal, S.Banerjee and I.Pratt mobicom 2005 What is MoB? It is an infrastructure for collaborative wide-area wireless data services.

More information

Lecture 16: Network Layer Overview, Internet Protocol

Lecture 16: Network Layer Overview, Internet Protocol Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,

More information

Lecture 5: Performance Analysis I

Lecture 5: Performance Analysis I CS 6323 : Modeling and Inference Lecture 5: Performance Analysis I Prof. Gregory Provan Department of Computer Science University College Cork Slides: Based on M. Yin (Performability Analysis) Overview

More information

TAIL LATENCY AND PERFORMANCE AT SCALE

TAIL LATENCY AND PERFORMANCE AT SCALE TAIL LATENCY AND PERFORMANCE AT SCALE George Porter May 21, 2018 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative Commons license

More information

Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA

Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA Mobile Devices: Server and Management Lesson 07 Mobile File Systems and CODA Oxford University Press 2007. All rights reserved. 1 Features of a File System Hierarchical organization Storage Modification

More information

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks * Naveen Chauhan 1, Lalit K. Awasthi 1, Narottam Chand 1, R.C. Joshi 2 and Manoj Misra 2 1 Department of Computer Science and Engineering National

More information

Hybrid Cooperative Caching in a Mobile Environment

Hybrid Cooperative Caching in a Mobile Environment Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing

More information

CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE. George Porter November 27, 2017

CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE. George Porter November 27, 2017 CSE 124: TAIL LATENCY AND PERFORMANCE AT SCALE George Porter November 27, 2017 ATTRIBUTION These slides are released under an Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0) Creative

More information

CE693: Adv. Computer Networking

CE693: Adv. Computer Networking CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are

More information

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1

Chapter 6 Queuing Disciplines. Networking CS 3470, Section 1 Chapter 6 Queuing Disciplines Networking CS 3470, Section 1 Flow control vs Congestion control Flow control involves preventing senders from overrunning the capacity of the receivers Congestion control

More information

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model

Outline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010

Scaling Without Sharding. Baron Schwartz Percona Inc Surge 2010 Scaling Without Sharding Baron Schwartz Percona Inc Surge 2010 Web Scale!!!! http://www.xtranormal.com/watch/6995033/ A Sharding Thought Experiment 64 shards per proxy [1] 1 TB of data storage per node

More information

Update Propagation Algorithms for Supporting Disconnected Write in Mobile Wireless Systems with Data Broadcasting Capability

Update Propagation Algorithms for Supporting Disconnected Write in Mobile Wireless Systems with Data Broadcasting Capability Wireless Personal Communications (2005) 34: 227 253 DOI: 10.1007/s11277-005-2845-2 C Springer 2005 Update Propagation Algorithms for Supporting Disconnected Write in Mobile Wireless Systems with Data Broadcasting

More information

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.

Outline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4. CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility

More information

Data Dissemination in Mobile Computing Environments (2)

Data Dissemination in Mobile Computing Environments (2) Data Dissemination in Mobile Computing Environments (2) Sungwon Jung Dept. of Computer Science and Engineering Sogang University Seoul, Korea Email : jungsung@sogang.ac.kr Indexing Techniques for Broadcast

More information

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary

Consistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Consistency and Replication Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Reasons for Replication Reliability/Availability : Mask failures Mask corrupted data Performance: Scalability

More information

A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks

A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks A New Location Caching with Fixed Local Anchor for Reducing Overall Location Management Cost in Wireless Mobile Networks Md. Mohsin Ali Department of Computer Science and Engineering (CSE) Khulna niversity

More information

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network

Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network Intra and Inter Cluster Synchronization Scheme for Cluster Based Sensor Network V. Shunmuga Sundari 1, N. Mymoon Zuviria 2 1 Student, 2 Asisstant Professor, Computer Science and Engineering, National College

More information

Frequently asked questions from the previous class survey

Frequently asked questions from the previous class survey CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [DISTRIBUTED COORDINATION/MUTUAL EXCLUSION] Shrideep Pallickara Computer Science Colorado State University L22.1 Frequently asked questions from the previous

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University

CS455: Introduction to Distributed Systems [Spring 2018] Dept. Of Computer Science, Colorado State University Frequently asked questions from the previous class survey CS 455: INTRODUCTION TO DISTRIBUTED SYSTEMS [DISTRIBUTED COORDINATION/MUTUAL EXCLUSION] Shrideep Pallickara Computer Science Colorado State University

More information

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Evaluation of Routing Protocols for Mobile Ad hoc Networks International Journal of Soft Computing and Engineering (IJSCE) Evaluation of Routing Protocols for Mobile Ad hoc Networks Abstract Mobile Ad hoc network is a self-configuring infrastructure less network

More information

Flow Control. Flow control problem. Other considerations. Where?

Flow Control. Flow control problem. Other considerations. Where? Flow control problem Flow Control An Engineering Approach to Computer Networking Consider file transfer Sender sends a stream of packets representing fragments of a file Sender should try to match rate

More information

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016

Distributed Systems Exam 1 Review Paul Krzyzanowski. Rutgers University. Fall 2016 Distributed Systems 2015 Exam 1 Review Paul Krzyzanowski Rutgers University Fall 2016 1 Question 1 Why did the use of reference counting for remote objects prove to be impractical? Explain. It s not fault

More information

CSE 123b Communications Software

CSE 123b Communications Software CSE 123b Communications Software Spring 2002 Lecture 13: Content Distribution Networks (plus some other applications) Stefan Savage Some slides courtesy Srini Seshan Today s class Quick examples of other

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

Today: Coda, xfs. Case Study: Coda File System. Brief overview of other file systems. xfs Log structured file systems HDFS Object Storage Systems

Today: Coda, xfs. Case Study: Coda File System. Brief overview of other file systems. xfs Log structured file systems HDFS Object Storage Systems Today: Coda, xfs Case Study: Coda File System Brief overview of other file systems xfs Log structured file systems HDFS Object Storage Systems Lecture 20, page 1 Coda Overview DFS designed for mobile clients

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications

Today s class. CSE 123b Communications Software. Telnet. Network File System (NFS) Quick descriptions of some other sample applications CSE 123b Communications Software Spring 2004 Today s class Quick examples of other application protocols Mail, telnet, NFS Content Distribution Networks (CDN) Lecture 12: Content Distribution Networks

More information

Introduction to Distributed Systems

Introduction to Distributed Systems Introduction to Distributed Systems Other matters: review of the Bakery Algorithm: why can t we simply keep track of the last ticket taken and the next ticvket to be called? Ref: [Coulouris&al Ch 1, 2]

More information

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols 1 Negative Reinforcement Time out Explicitly degrade the path by re-sending interest with lower data rate. Source Gradient New Data Path

More information

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002

EL Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Instructions: EL 604 - Wireless and Mobile Networking Spring 2002 Mid-Term Exam Solution - March 6, 2002 Be sure to write your name on your submission. This is an open book test. Use your class notes,

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee

Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.

More information

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES

PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES PERFORMANCE ANALYSIS FOR GPRS WITH PRIORITIZED AND NON-PRIORITIZED MOBILITY MANAGEMENT PROCEDURES Karann Chew, Rahim Tafazolli University of Surrey, United Kingdom Abstract - GPRS is part of the evolution

More information

A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks

A New Hashing and Caching Approach for Minimizing Overall Location Management Cost in Next-Generation Wireless Networks Md. Mohsin Ali et al. / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 1 (), 010, 67-76 A New Hashing and Caching Approach for Minimizing Overall Location Management

More information

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet

Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks. Congestion Control in Today s Internet Core-Stateless Fair Queueing: Achieving Approximately Fair Bandwidth Allocations in High Speed Networks Ion Stoica CMU Scott Shenker Xerox PARC Hui Zhang CMU Congestion Control in Today s Internet Rely

More information

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing

DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing DDSS: Dynamic Dedicated Servers Scheduling for Multi Priority Level Classes in Cloud Computing Husnu Saner Narman Md. Shohrab Hossain Mohammed Atiquzzaman School of Computer Science University of Oklahoma,

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer E.g. HTTP (used by web services) typically uses TCP Reliable transport between client and server required TCP Stream oriented Network friendly: time-out congestion

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

048866: Packet Switch Architectures

048866: Packet Switch Architectures 048866: Packet Switch Architectures Output-Queued Switches Deterministic Queueing Analysis Fairness and Delay Guarantees Dr. Isaac Keslassy Electrical Engineering, Technion isaac@ee.technion.ac.il http://comnet.technion.ac.il/~isaac/

More information

Lecture 9. Quality of Service in ad hoc wireless networks

Lecture 9. Quality of Service in ad hoc wireless networks Lecture 9 Quality of Service in ad hoc wireless networks Yevgeni Koucheryavy Department of Communications Engineering Tampere University of Technology yk@cs.tut.fi Lectured by Jakub Jakubiak QoS statement

More information

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks

15-441: Computer Networking. Lecture 24: Ad-Hoc Wireless Networks 15-441: Computer Networking Lecture 24: Ad-Hoc Wireless Networks Scenarios and Roadmap Point to point wireless networks (last lecture) Example: your laptop to CMU wireless Challenges: Poor and variable

More information

3. Evaluation of Selected Tree and Mesh based Routing Protocols

3. Evaluation of Selected Tree and Mesh based Routing Protocols 33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in

More information