4. Data Transmitting Agent based strategy for
|
|
- Scot Gallagher
- 5 years ago
- Views:
Transcription
1 120 Chapter 4 4. Data Transmitting Agent based strategy for Effective Cache Consistency 4.1 Architecture of Multicast-Data Dissemination Model Using Data Transmitting Agent The architecture of a mobile wireless communication network is illustrated in Fig. 4.1 and it is the motivation for the real model of the proposed system. It consists of a system with a wired network and is populated by various other components such as a number of mobile devices (Mobile Units-MUs or Mobile Hosts-MHs), multiple Original Servers and Base Stations (BS) also called Mobile Support Stations (MSS). A scenario consisting of two cells is depicted in the figure. Each cell is considered to be hexagonal shaped. The Base Stations in the corresponding cell are connected via a wired link to Mobile Switch Centre (MSC). Any BS is connected through the wired link to the Server on the communication network and serves multiple MHs through wireless channels. It maintains a Server Cache (SC) to store the data items. But storing the contents in the BS cache is not possible because many mobile devices are under the control of BS and the size of cache is small. Therefore, only data-identifiers corresponding to the most recent copy of the data-items are kept. Within this scenario, we consider read-only
2 121 communication, that is, all updates are performed at the server and the MHs are not allowed to alter the data-items individually. Even the MHs maintain a Mobile Host Cache (MHC) individually to keep some of the data-items that are retrieved from the server. A BS is usually responsible for maintaining cache consistency between the MHs and the servers, but this work introduces a novel method. In this method, one of the MH among several MHs is designated as DTA. DTA is completely delegated the responsibility of distributing the data-items pertaining to a specific group having similar interest using the multicast data dissemination strategy and thus helps to maintain cache consistency in wireless mobile communication environment. Hence, there are issues of cache consistency to be maintained at two levels i.e. SC- DTAC and DTAC- MHCs where DTAC represents the DTA Cache. This strategy assumes that there is cache consistency between SC and original servers present on the wired network. This strategy provides weak cache consistency for MHC with a remarkable cache hit probability is increased by the cache replacement algorithm discussed in chapter 6. The MHs requiring strong cache consistency can cross check the cached data item with the data entry present in the BS for each data access. In the existing strategies, the MH was probable to get a stale copy for two reasons: (1) It misses the IR of data item (2) the update time of a data item is smaller than expiration of TTL [27].
3 122 These cases can be improved by the use of the proposed scheme, where the client sends the very first request only to the server and the server redirects the query of the client to the DTA. From this point onwards, the DTA is responsible for offering data items to the client and thus the cache consistency between DTAC-MHC has to be considered. Even if the client sleeps, it can get the updated value of the data item it needs from the DTA, because the DTA always holds the latest copy of the data item. This is possible due to the fact that whenever the server broadcasts the information about the updates, the DTA checks the IR to see if there are items corresponding to all those MHs who are registered within the multicast group. The clients within the group have common data interests as that of DTA. Hence, even if the client sleeps and unexpectedly misses the broadcast, the DTA shares that copy with all such MHs. The DTA may have to store huge amount of data in the process of maintaining cache consistency. Therefore, a decision has to be made regarding which data should remain in the cache. The specific amount of time for which DTA stores the data is decided by the Cache Replacement Policy (CRP) discussed in section 6.3. The DTA multicasts the latest updates of data to all the MHs in its group periodically or on receiving a query from any of the MHs. If the data update is missed by any MH, then (i) It can send a request to DTA (ii) It can use its cached copy by checking the timestamp and Predicted-Deviation-in-Update- Interval(PDUI) that has been received in the previous multicast. The
4 123 success of the proposed model lies in selection of DTA. A DTA is selected from among the clients depending on the factors like lifetime of mobile client, energy and distance from base station. This set-up can conveniently provide cache consistency for dynamic data such as traffic information, sports, news, stock updates, online transaction information, etc. By incorporating sufficient security in the system, DTA can authenticate nodes on the network before providing the information to all the nodes registered under it. The IRs corresponding to dynamic data such as news, traffic information and sports are broadcast without acknowledgement whereas stock exchange information and online transaction information needs to be acknowledged.
5 DTA - based Multicast Data Dissemination for Effective Cache Consistency The proposed system is based on a simulation model depicted below: In this model, each client is a process and is divided into two subprocesses called Query Generator and internal Multicast-based Pull Manager. The client acts as a Data Transmitting Agent whenever the Multicast-based Pull Manager is active. The query generator loops continuously and requests for a page at random. To answer the query, it first checks the cache within the client, and an immediate reply follows, if a valid copy of the desired data item exists. Otherwise, it sends a request to the DTA and it multicasts the request suitable number of times. The clients are assumed to have a fixed size cache and make use of replacement Policy based on Semantic-Neural-Network Cache Replacement Policy (SNN-CRP). The DTA stores the data on behalf of the client s similar interests and multicasts to the clients on the wireless network. Since DTA downloads the complete data for the clients who are all registered with it, an enhanced version of CRP is required to manage the data on the client side. This CRP minimizes the access time further. Data in Cache can be accessed faster than that in Main memory of the client but at the same time the size of any cache is at least times smaller than the main memory and therefore the data has to be swapped
6 125 and mapped against the required data which is most frequently referred by the clients of common interests. Server Database Broadcast Messager Broadcast Channel Broadcast Program g b d a c e Push Pull Mux a c a f b a Message Manager Access Pattern Server Queue Page Reciever Client 1 DTA Client N No Bit Vector Yes Double No Dropped Query Generator Query Generator Query Generator O Full Yes Blocked Cache Thresh Filter Cache Thresh Filter Cache Thresh Filter Pull Manager Pull Manager MC-DTA Pull Manager Pull Request MC-DTA Pull Request Pull Request Uplink Channel Fig 4.2 Internal Architecture of Data Distribution in MWCN
7 Invalidation Report Generation and Query Request Invalidation Report (IR) generation strategy is one of the popular technique to achieve consistency in wireless communication environment. In this method MH is informed about the status of data whether (valid or invalid). The existing IR schemes are broadly classified into two categories: stateless and stateful server approach. The server does not keep track of contents of its mobile hosts in a stateless server approach instead the MH checks the data item for its validity prior to answering the request. The server keeps track of the contents of its MH in a stateful server approach and informs the MH whenever a data item is updated. A simple database management is required in stateless strategy which results in a huge traffic on the wireless communication network due to the query from MH to the Server. The performance of this strategy degrades with the addition of MHs (high scale factor) and the MH has to listen the channel to find the status of its cache. Thus losing energy and wasting power of the device. On the other hand the stateful method is scalable but there is server management overhead and the mobility of MH since the information of movement to a different cell should be notified to the server. In the proposed model if the data is updated at the server, BS is informed about the validity of data with the help of wired network. BS can now identify the invalid data item by using
8 127 the concept of flags. It clears the flag of DTA by placing a zero and then the IR is broadcasted to all the users and the users those receive the IR will invalidate data correspondingly. The main focus of the proposed technique is to maintain consistency of data at the DTA since it is the central point for all the disconnected and sleeping MHs. The DTA can request the updated version of the data items from the BS. In this way the DTA receives the correct copy of data. After receiving the broadcast DTA sends acknowledgement and immediately the BS resets the flag for corresponding data entry. In the next step the DTA can multicast the correct copy of the data to the MH that could not get the information due to reasons like sleep mode, network traffic congestion and switch off mode. Hence these clients need not uplink individually to get the latest updates of the data that they share with others even if they missed the broadcast before. 4.4 Cache Management at Base Station, DTA and Mobile Hosts Data Caching Each data item namely dk is identified by a unique identifier k. The Base Station Cache (SC) contains ( k, dk, tk, DTA-flag, Valid-flag, PDUI(AVI), Roam-flag, SDTA-flag ). An MHC contains (k, dk, tk, Valid-Flag, PDUI(AVI) and DTA-flag). If DTA-flag is set the corresponding MH is a DTA. On the other hand if DTA-flag = 0 then the corresponding MH is not a DTA. SDTA is necessary to select a successor DTA.
9 128 Mobile Host Cache Management MHC Management deals with maintenance of cache consistency through the Least Recently Used (LRU) Cache Replacement Policy (CRP) [24, 37, 38] or an enhanced CRP due to the fact that the MH designated as DTA has lot of data that is to be accessed by its peers. Chapter 6 discusses a new CRP namely SNN-CRP that further improves the performance of this strategy. 4.5 DTA - Roaming DTA notifies the BS about new location whenever it moves to a new cell. This situation can be resolved in two ways in (i) The BS can move the data under the DTA s charge to the corresponding successor(nominate a new MH as DTA) The BS will maintain details of the current DTA as well as the successor DTA if at all the DTA leaves the cell. (ii) BS can alternatively forward the requests from MHs to the new location where the DTA has moved. The latter method circumvents various issues and therefore the proposed strategy is based on the first technique. During the movement of the MH from one cell to another it may switch between sleep mode to awake-mode and vice-versa. An MH has to invalidate its cache while it is in the sleep state but if it is awake while roaming then the data in its cache is assumed to be valid. Also it
10 129 will be able to provide the new BS with its data and make it accessible whenever needed. 4.6 Query Description 1. The Mobile clients are PDA s, Laptops etc. The Base station (called server from here after) will identify one of the existing clients in the cell as the leader or DTA. 2. The factors for DTA selection are Energy level, Distance from server, Access rate. 3. The Clients send average of the values of the three factors to the server. 4. Server compares all three values sent by the clients and selects the highest among them and then broadcasts to the clients the port number of the client having the highest average value as the DTA. 5. Once the DTA is identified, that particular client requests the server for the latest updates. 6. After getting the latest updates from the server, the DTA creates a multicast group and multicasts the data. 7. Other clients join the multicast group and receive the multicast data 8. For further queries, clients uplink only to the DTA. 9. DTA gets updates from the server which it multicasts and clients get the updates from DTA.
11 Flowchart 1. The Clients send average of three factors (Distance from BS, Access rate, Energy) 2. BS selects DTA and announces it among the clients 3. Query comes in at client for data Check if data is available in cache? Yes 4. valid? ( check its AVI ) Yes 5. Return to User Stop Send request to BS/ DTA BS 6. Redirect request to DTA if registered user otherwise register 7. DTA multicasts updates to clients who are Group members and read data from group address and caches it Fig 4.3 Flowchart depicting sequence of activities to answer a query
12 Base Station Algorithm Begin Steps 1,2,3 & 4 are initial and are used to select the DTA 1. All the MH s sends average of the three parameters namely energy, distance, and lifetime to the BS. 2. BS receives average of the values of the three parameters from interested MH s. 3. BS Compares all three values sent by the MH s and designates the one having the highest average value among them as the DTA. Repeat the steps 4,5,6 & 7 for each time DTA gets nominated. 4. BS Broadcasts the information of the DTA to all MH s within the cell. 5. BS Broadcasts IR containing information of all those data items that are updated to all MH s. 6. If MH missed Broadcast(DTAnom,timex) If (BS gets query(x) from MH) then BS redirects the MH to DTA. 7. BS receives the query(x) from DTA for latest updates If (dx is available in BS cache ) Send Valid_data(x,dx,PDUI x, tx ) to DTA Else Send query(x) to server. 8. If (BS gets Update(x, d x,time x ) from the server) Update the database entry with ID x: as: dx = d x and tx = time x
13 132 end Client Algorithm Begin 1. If (MH receives query(x) message) If (dx is present in MH s cache and has valid AVI) Answer the query. 2. If dx is not present in MH s cache with a valid PDUI Send query(x) to BS 3. MHs register with DTA after the nomination of DTA to get specific service or updates from the DTA. 4. If dx is not present in MH s cache with a valid PDUI Send query(x) to DTA. 5. If (dx is valid in cache of DTA) Receive Multicast of dx periodically from DTA else DTA Sends query(x) to BS. end DTA Algorithm
14 133 Begin 1. If (DTA gets query(x) from MH) If (dx is valid in cache of DTA) Multicast dx to all clients in the multicast group else Send query(x) to BS i.e. uplink to BS on behalf of MH 2. The MHs interested in the same information need not send query(x) message to the BS later. They obtain updates from DTA only. end. The main idea in the proposed system is to maintain cache consistency between the DTA and the nodes in the group.
FLEXIBLE DATA DISSEMINATION STRATEGY FOR EFFECTIVE CACHE CONSISTENCY IN MOBILE WIRELESS COMMUNICATION NETWORKS
FLEXIBLE DATA DISSEMINATION STRATEGY FOR EFFECTIVE CACHE CONSISTENCY IN MOBILE WIRELESS COMMUNICATION NETWORKS Kahkashan Tabassum 1 Asia Sultana 2 and Dr. A. Damodaram 3 1 Department of CS & IT, Maulana
More informationDynamic Cache Consistency Schemes for Wireless Cellular Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., FEBRUARY 00 Dynamic Cache Consistency Schemes for Wireless Cellular Networks Zhijun Wang, Mohan Kumar, Sajal K Das, and Huaping Shen Abstract
More informationA Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment
A Strategy to Manage Cache Coherency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Shumei Chen Hoang Nguyen Jeff Wilson Team Members
More informationOn Improving the Performance of Cache Invalidation in Mobile Environments
Mobile Networks and Applications 7, 291 303, 2002 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. On Improving the Performance of Cache Invalidation in Mobile Environments GUOHONG CAO
More informationA Centralized Approaches for Location Management in Personal Communication Services Networks
A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,
More informationCache Management for Concurrent Transaction Execution in Mobile Wireless Environment
Journal of Computer Science 7 (3): 374-378, 2011 ISSN 1549-3636 2011 Science Publications Cache Management for Concurrent Transaction Execution in Mobile Wireless Environment 1 J.C. Miraclin Joyce Pamila
More informationWeb-based Energy-efficient Cache Invalidation in Wireless Mobile Environment
Web-based Energy-efficient Cache Invalidation in Wireless Mobile Environment Y.-K. Chang, M.-H. Hong, and Y.-W. Ting Dept. of Computer Science & Information Engineering, National Cheng Kung University
More informationCluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network
American Journal of Applied Sciences 9 (8): 1307-1315, 2012 ISSN 1546-9239 2012 Science Publications Cluster Based Data Consistency for Cooperative Caching over Partitionable Mobile Adhoc Network 1 Kuppusamy,
More informationMobile Routing : Computer Networking. Overview. How to Handle Mobile Nodes? Mobile IP Ad-hoc network routing Assigned reading
Mobile Routing 15-744: Computer Networking L-10 Ad Hoc Networks Mobile IP Ad-hoc network routing Assigned reading Performance Comparison of Multi-Hop Wireless Ad Hoc Routing Protocols A High Throughput
More informationA COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET
ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer
More informationImproving Reliable Transport and Handoff Performance in Cellular Wireless Networks
Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction
More informationMaintaining Mutual Consistency for Cached Web Objects
Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University
More informationCERIAS Tech Report Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien
CERIAS Tech Report 2003-56 Autonomous Transaction Processing Using Data Dependency in Mobile Environments by I Chung, B Bhargava, M Mahoui, L Lilien Center for Education and Research Information Assurance
More informationTHE falling cost of both communication and mobile
IEEE TANSACTIONS ON KNOWLEDGE AND DATA ENGINEEING, VOL. 15, NO. 5, SEPTEMBE/OCTOBE 2003 1251 A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments Guohong Cao, Member, IEEE Abstract
More informationIEEE C /08
2003-01-10 IEEE C802.20-03/08 Project Title IEEE 802.20 Working Group on Mobile Broadband Wireless Access A Vision of an IP-based Cellular Network Date Submitted
More informationProactive Approach for Cooperative Caching in Mobile Adhoc Networks
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi
More informationChapter 3 A New Framework for Multicast Mobility in WiFi Networks
Chapter 3 A New Framework for Multicast Mobility in WiFi Networks 3.1 Introduction This chapter presents the designed framework that was produced during this research. The chapter describes about network
More informationBRANCH:IT FINAL YEAR SEVENTH SEM SUBJECT: MOBILE COMPUTING UNIT-IV: MOBILE DATA MANAGEMENT
- 1 Mobile Data Management: Mobile Transactions - Reporting and Co Transactions Kangaroo Transaction Model - Clustering Model Isolation only transaction 2 Tier Transaction Model Semantic based nomadic
More informationFixed Internetworking Protocols and Networks. IP mobility. Rune Hylsberg Jacobsen Aarhus School of Engineering
Fixed Internetworking Protocols and Networks IP mobility Rune Hylsberg Jacobsen Aarhus School of Engineering rhj@iha.dk 1 2011 ITIFN Mobile computing Vision Seamless, ubiquitous network access for mobile
More informationDCIM: Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile networks
DCIM: Distributed Cache Invalidation Method for maintaining cache consistency in wireless mobile networks Kassem Fawaz, and Hassan Artail, Senior Member, IEEE Abstract This paper proposes a client-based
More informationA Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks
A Comparative and Performance Study of On Demand Multicast Routing Protocols for Ad Hoc Networks P.Madhan Mohan #, J.James Johnson #, K.Murugan $ and V.Ramachandran % # Under Graduate Student $ Senior
More informationRouting Protocols in MANETs
Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an
More informationCSE 123A Computer Netwrking
CSE 123A Computer Netwrking Winter 2005 Mobile Networking Alex Snoeren presenting in lieu of Stefan Savage Today s s issues What are implications of hosts that move? Remember routing? It doesn t work anymore
More informationCSE 123b Communications Software
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Stefan Savage Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to
More informationQuick announcements. CSE 123b Communications Software. Today s issues. Last class. The Mobility Problem. Problems. Spring 2004
CSE 123b Communications Software Spring 2004 Lecture 9: Mobile Networking Quick announcements Typo in problem #1 of HW #2 (fixed as of 1pm yesterday) Please consider chapter 4.3-4.3.3 to be part of the
More informationToday: World Wide Web! Traditional Web-Based Systems!
Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based
More informationMobile IP and Mobile Transport Protocols
Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»
More informationA NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS
A NOVEL R-SIP CACHE CONSISTENCY MECHANISM FOR MOBILE WIRELESS NETWORKS 1 LILLY SHEEBA S, 2 YOGESH P 1 Assistant Professor, Department of Information Technology, Anna University, Jerusalem College of Engineering,
More informationPerformance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s
Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations
More informationService Management in PCN Systems
Lecture 2: Service and Data Management Ing-Ray Chen CS 6204 Mobile Computing Virginia Tech Fall 2005 Courtesy of G.G. Richard III for providing some of the slides for this chapter 1 Service Management
More informationOptimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee
Optimized Paging Cache Mappings for efficient location management Hyun Jun Lee, Myoung Chul Jung, and Jai Yong Lee Abstract Cellular IP maintains distributed cache for location management and routing purposes.
More informationLast Class: Consistency Models. Today: Implementation Issues
Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching
More informationCommunications Software. CSE 123b. CSE 123b. Spring Lecture 10: Mobile Networking. Stefan Savage
CSE 123b CSE 123b Communications Software Spring 2003 Lecture 10: Mobile Networking Stefan Savage Quick announcement My office hours tomorrow are moved to 12pm May 6, 2003 CSE 123b -- Lecture 10 Mobile
More informationQuick announcement. CSE 123b Communications Software. Last class. Today s issues. The Mobility Problem. Problems. Spring 2003
CSE 123b Communications Software Quick announcement My office hours tomorrow are moved to 12pm Spring 2003 Lecture 10: Mobile Networking Stefan Savage May 6, 2003 CSE 123b -- Lecture 10 Mobile IP 2 Last
More informationChapter 8 LOCATION SERVICES
Chapter 8 LOCATION SERVICES Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Mobile IP Motivation Data transfer Encapsulation Location Services & Routing Classification of location
More informationModelling and Analysis of Push Caching
Modelling and Analysis of Push Caching R. G. DE SILVA School of Information Systems, Technology & Management University of New South Wales Sydney 2052 AUSTRALIA Abstract: - In e-commerce applications,
More informationEfficient Cache Consistency in Server-Based MANET with Cache Replication
Efficient Cache Consistency in Server-Based MANET with Cache Replication J. Bibiana Jenifer 1, M. Manikandan 2 Student, Computer Science and Engineering, Adhiyamaan College of Engineering, Hosur, India
More informationMaster s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日
Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印
More informationLECTURE 8. Mobile IP
1 LECTURE 8 Mobile IP What is Mobile IP? The Internet protocol as it exists does not support mobility Mobile IP tries to address this issue by creating an anchor for a mobile host that takes care of packet
More informationInformation Technology Mobile Computing Module: GSM Handovers
Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter
More informationReplication in Distributed Systems
Replication in Distributed Systems Replication Basics Multiple copies of data kept in different nodes A set of replicas holding copies of a data Nodes can be physically very close or distributed all over
More informationReplication. Consistency models. Replica placement Distribution protocols
Replication Motivation Consistency models Data/Client-centric consistency models Replica placement Distribution protocols Invalidate versus updates Push versus Pull Cooperation between replicas Client-centric
More informationISSN 2319-8885 Vol.03,Issue.35 November-2014, Pages:6974-6978 www.ijsetr.com A Caching Scheme in Location Based Application SANDI WINN AYE 1, ZAR ZAR WINT 2 1 Dept of Information and Communication Technology,
More informationArvind Krishnamurthy Fall 2003
Ad-hoc Routing Arvind Krishnamurthy Fall 2003 Ad Hoc Routing Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationP A R T T W O MOBILE IPv6
P A R T T W O MOBILE IPv6 Mobile IPv6 T H R E E Consider a scenario where you had to change your place of residence on a semipermanent basis, for instance, due to relocation of your company. One problem
More informationTable of Contents 1 NTP Configuration 1-1
Table of Contents 1 NTP Configuration 1-1 NTP Overview 1-1 Applications of NTP 1-1 Advantages of NTP 1-2 How NTP Works 1-2 NTP Message Format 1-3 Operation Modes of NTP 1-5 NTP Configuration Task List
More informationData Dissemination in Mobile Computing Environments (2)
Data Dissemination in Mobile Computing Environments (2) Sungwon Jung Dept. of Computer Science and Engineering Sogang University Seoul, Korea Email : jungsung@sogang.ac.kr Indexing Techniques for Broadcast
More informationSubject: Adhoc Networks
ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.
More informationOutline 9.2. TCP for 2.5G/3G wireless
Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,
More informationCACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS
International Journal of Wireless Communications and Networking 3(1), 2011, pp. 7-13 CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS Sudhanshu Pant 1, Naveen Chauhan 2 and Brij Bihari Dubey 3 Department
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of
More informationDatabases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments
Databases Lesson 03 Data Cache Consistency Maintenance in Mobile and Web Environments Oxford University Press 2007. All rights reserved. 1 Access Latency in mobile environment A device needs a data-record
More informationIEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <http://grouper.ieee.org/groups/802/20/>
2003-03-09 IEEE C802.20-03/26 Project Title Date Submitted IEEE 802.20 Working Group on Mobile Broadband Wireless Access Architectural Attributes of an IP-based
More informationMobility Support in IPv6
Mobility Support in IPv6 Charles E. Perkins David B. Johnson T. J. Watson Research Center Computer Science Department IBM Corporation Carnegie Mellon University Hawthorne, NY 10532 Pittsburgh, PA 15213
More informationContent. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.
Rahem Abri Content 1. Introduction 2. The Ad-hoc On-Demand Distance Vector Algorithm Path Discovery Reverse Path Setup Forward Path Setup Route Table Management Path Management Local Connectivity Management
More informationAd Hoc Routing. Ad-hoc Routing. Problems Using DV or LS. DSR Concepts. DSR Components. Proposed Protocols
d oc Routing d-hoc Routing rvind Krishnamurthy all 2003 Create multi-hop connectivity among set of wireless, possibly moving, nodes Mobile, wireless hosts act as forwarding nodes as well as end systems
More informationMobile IP. Mobile Computing. Mobility versus Portability
Mobile IP Mobile Computing Introduction Amount of mobile/nomadic computing expected to increase dramatically in near future. By looking at the great acceptance of mobile telephony, one can foresee a similar
More informationHybrid Cooperative Caching in a Mobile Environment
Hybrid Cooperative Caching in a Mobile Environment Hong Va Leong 1, Chi-yin Chow 2 1 Department of Computing, The Hong Kong Polytechnic University Hong Kong cshleong@comp.polyu.edu.hk 2 Department of Computing
More informationProtocol Specification of the MOMBASA Software Environment
Technical University Berlin Telecommunication Networks Group Protocol Specification of the MOMBASA Software Environment A. Festag, L. Westerhoff {festag westerhoff}@ee.tu-berlin.de Berlin, October 2001
More informationMobile Transport Layer
Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:
More informationComputer Communications
Computer Communications 35 (12) 38 391 Contents lists available at SciVerse ScienceDirect Computer Communications journal homepage: www.elsevier.com/locate/comcom Cache invalidation strategies for Internet-based
More informationA DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET
2008 IEEE Asia-Pacific Services Computing Conference A DHCPv6 Based IPv6 Autoconfiguration Mechanism for Subordinate MANET Shubhranshu Singh Advanced Technology Division Samsung India Software Operations
More informationHandover Management for Mobile Nodes in IPv6 Networks
TECHNOLOGY ADVANCES FOR 3G AND BEYOND Handover Management for Mobile Nodes in IPv6 Networks Nicolas Montavont and Thomas Noël LSIIT Louis Pasteur University CNRS, Strasbourg ABSTRACT In this article we
More informationAvoidance of Bottleneck in PCS Network
Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept
More informationTransaction Processing in Mobile Database Systems
Ashish Jain* 1 http://dx.doi.org/10.18090/samriddhi.v7i2.8631 ABSTRACT In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore,
More informationScalable overlay Networks
overlay Networks Dr. Samu Varjonen 1 Lectures MO 15.01. C122 Introduction. Exercises. Motivation. TH 18.01. DK117 Unstructured networks I MO 22.01. C122 Unstructured networks II TH 25.01. DK117 Bittorrent
More informationTHE Global System for Mobile Communications (GSM)
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 6, NO. 6, DECEMBER 1998 851 Database and Location Management Schemes for Mobile Communications Anna Hać, Senior Member, IEEE, and Bo Liu Abstract Signaling traffic
More informationRegistration, Broadcast, Cache, Transaction Reversal and Security
Registration, Broadcast, Cache, Transaction Reversal and Security Telecommunications and Networks Group IIT Madras Deepti Kumar deepti@lantana.tenet.res.in TeNeT Group IIT-M 2 nd December Outline Registration
More informationComputer Networks, Andrew Tannenbaum, Chapter 5.6. Computer Networking: A Top Down Approach Featuring the
Mobile IP (IPv4 and IPv6) Dr. John Keeney 3BA33 Elements of a wireless Wired infrastructure wireless hosts laptop, PDA, IP phone run applications may be stationary (nonmobile) or mobile wireless does not
More informationA Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment
A Strategy to Manage Cache Consistency in a Distributed Mobile Wireless Environment Anurag Kahol, Sumit Khurana, Sandeep K. S. Gupta, and Pradip K. Srimani Department of Computer Science Colorado State
More informationM Commerce: Mobile Applications. Sridhar Iyer K R School of Information Technology IIT Bombay
M Commerce: Mobile Applications Sridhar Iyer K R School of Information Technology IIT Bombay sri@it.iitb.ernet.in http://www.it.iitb.ernet.in/~sri Outline Mobile applications Wireless networking Routing
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationDistributed Fault-Tolerant Channel Allocation for Cellular Networks
1326 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 18, NO. 7, JULY 2000 Distributed Fault-Tolerant Channel Allocation for Cellular Networks Guohong Cao, Associate Member, IEEE, and Mukesh Singhal,
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Question 1 of 50. Traffic going to a public IP address is being translated by your Palo Alto Networks firewall to your
More informationOutline. CS5984 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Host Mobility Problem Solutions. Network Layer Solutions Model
CS5984 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationOperation Manual NTP. Table of Contents
Table of Contents Table of Contents... 1-1 1.1 NTP Overview... 1-1 1.1.1 Applications of NTP... 1-1 1.1.2 How NTP Works... 1-2 1.1.3 NTP Message Format... 1-4 1.1.4 Operation Modes of NTP... 1-5 1.1.5
More informationOutline. CS6504 Mobile Computing. Host Mobility Problem 1/2. Host Mobility Problem 2/2. Dr. Ayman Abdel-Hamid. Mobile IPv4.
CS6504 Mobile Computing Outline Host Mobility problem and solutions IETF Mobile IPv4 Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Mobile IPv4 1 2 Host Mobility Problem 1/2 Host Mobility
More informationPERSONAL communications service (PCS) provides
646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,
More informationChapter 09 Network Protocols
Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems
More informationLECTURE 9. Ad hoc Networks and Routing
1 LECTURE 9 Ad hoc Networks and Routing Ad hoc Networks 2 Ad Hoc Networks consist of peer to peer communicating nodes (possibly mobile) no infrastructure. Topology of the network changes dynamically links
More informationDesign Guide- Mobility
Proxim Wireless. All rights reserved. 1 Purpose This document serves as a reference guide for the mobility network designers to plan and design a mobility network that suits their requirement. Mobility
More informationLocalized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1
Localized and Incremental Monitoring of Reverse Nearest Neighbor Queries in Wireless Sensor Networks 1 HAI THANH MAI AND MYOUNG HO KIM Department of Computer Science Korea Advanced Institute of Science
More informationDaedalus/GloMop Architectural Walkthrough
Daedalus/ Architectural Walkthrough Daedalus Retreat, Lake Tahoe June 18-20th, 1996 Steve Gribble and Todd Hodes {gribble,hodes}@cs.berkeley.edu Outline Motivation and overview Core architecture components
More informationChapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms
Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer
More informationMobile & Wireless Networking. Lecture 10: Mobile Transport Layer & Ad Hoc Networks. [Schiller, Section 8.3 & Section 9] [Reader, Part 8]
192620010 Mobile & Wireless Networking Lecture 10: Mobile Transport Layer & Ad Hoc Networks [Schiller, Section 8.3 & Section 9] [Reader, Part 8] Geert Heijenk Outline of Lecture 10 Mobile transport layer
More informationConsistency and Replication. Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary
Consistency and Replication Some slides are from Prof. Jalal Y. Kawash at Univ. of Calgary Reasons for Replication Reliability/Availability : Mask failures Mask corrupted data Performance: Scalability
More informationUsing Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network
International Journal of Computer Science and Telecommunications [Volume 2, Issue 6, September 2011] 15 ISSN 2047-3338 Using Swarm Intelligence to Optimize Caching Techniques for Ad Hoc Network Appavoo
More informationA New Hashing and Caching Approach for Reducing Call Delivery Cost and Location Server s Load in Wireless Mobile Networks
Proceedings of 2009 12 th International Conference on Computer and Information Technology (ICCIT 2009) 21-23 December, 2009, Dhaka, Bangladesh A New Hashing and Caching Approach for Reducing Call Delivery
More informationMobile IP. rek. Petr Grygárek Petr Grygarek, Advanced Computer Networks Technologies 1
Mobile IP Petr Grygárek rek 1 Basic principle Picture from IOS IP and IP Routing Configuration Guide Mobile node maintains the same IP address even while roaming in foreign networks even if it s address
More informationMohammad Hossein Manshaei 1393
Mohammad Hossein Manshaei manshaei@gmail.com 1393 Mobile IP 2 Mobile Network Layer: Problems and Concerns Entities and Terminology in Mobile IP Mobile Indirect Routing Mobile IP Agent Advertisement Registration
More informationConsistency and Replication 1/65
Consistency and Replication 1/65 Replicas and Consistency??? Tatiana Maslany in the show Orphan Black: The story of a group of clones that discover each other and the secret organization Dyad, which was
More informationAn Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network
An Improvement of TCP Downstream Between Heterogeneous Terminals in an Infrastructure Network Yong-Hyun Kim, Ji-Hong Kim, Youn-Sik Hong, and Ki-Young Lee University of Incheon, 177 Dowha-dong Nam-gu, 402-749,
More informationCollaborative Caching Architecture for Continuous Query in Mobile Database
American Journal of Economics and Business Administration 3 (1): 33-39, 2011 ISSN 1945-5488 2010 Science Publications Collaborative Caching Architecture for Continuous Query in Mobile Database Mohamed
More informationAgenda. What are we looking at? Introduction. Aim of the project. IP Routing
Agenda Handoffs in Cellular Wireless Networks: The Daedalus Implementation & Experience by Shrinivasan Seshan, Hari Balakrishnan Randy H. Katz A short presentation by Aishvarya Sharma Dept of Computer
More informationAnnouncements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday
ECE/CS 372 introduction to computer networks Lecture 15 Announcements: Assignment 4 due now Lab 4 due next Tuesday Assignment 5 posted, due next Thursday Credit for lecture slides to Professor Bechir Hamdaoui
More informationIN a mobile ad hoc network, nodes move arbitrarily.
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 5, NO. 6, JUNE 2006 609 Distributed Cache Updating for the Dynamic Source Routing Protocol Xin Yu Abstract On-demand routing protocols use route caches to make
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 8 CMPE 257 Spring'15 1 Announcements Project proposals. Feedback. Class schedule updated. Exam:
More informationPerformance Analysis of MANET Routing Protocols OLSR and AODV
VOL. 2, NO. 3, SEPTEMBER 211 Performance Analysis of MANET Routing Protocols OLSR and AODV Jiri Hosek Faculty of Electrical Engineering and Communication, Brno University of Technology Email: hosek@feec.vutbr.cz
More informationSimulating a General Purpose Mobile Computing Environment
Computer Science Technical Report Simulating a General Purpose Mobile Computing Environment Anurag Kahol, Sumit Khurana, Sandeep Gupta and Pradip Srimani Department of Computer Science Colorado State University
More informationTable of Contents 1 IGMP Snooping Configuration 1-1
Table of Contents 1 IGMP Snooping Configuration 1-1 IGMP Snooping Overview 1-1 Principle of IGMP Snooping 1-1 Basic Concepts in IGMP Snooping 1-2 How IGMP Snooping Works 1-3 Processing of Multicast Protocol
More information