SlideShare uma empresa Scribd logo
1 de 10
DCIM: Distributed Cache Invalidation Method for
Maintaining Cache Consistency In Wireless Mobile
Networks
ABSTRACT:
This paper proposes distributed cache invalidation mechanism (DCIM), a client-
based cache consistency scheme that is implemented on top of a previously
proposed architecture for caching data items in mobile ad hoc networks
(MANETs), namely COACS, where special nodes cache the queries and the
addresses of the nodes that store the responses to these queries. We have also
previously proposed a server-based consistency scheme, named SSUM, whereas in
this paper, we introduce DCIM that is totally client-based. DCIM is a pull-based
algorithm that implements adaptive time to live (TTL), piggybacking, and
prefetching, and provides near strong consistency capabilities. Cached data items
are assigned adaptive TTL values that correspond to their update rates at the data
source, where items with expired TTL values are grouped in validation requests to
the data source to refresh them, whereas unexpired ones but with high request rates
are prefetched from the server. In this paper, DCIM is analyzed to assess the delay
and bandwidth gains (or costs) when compared to polling every time and push-
based schemes. DCIM was also implemented using ns2, and compared against
client-based and server-based schemes to assess its performance experimentally.
The consistency ratio, delay, and overhead traffic are reported versus several
variables, where DCIM showed to be superior when compared to the other
systems.
EXISTING SYSTEM:
The cache consistency mechanisms in the literature can be grouped into three main
categories: push based, pull based, and hybrid approaches. Push-based mechanisms
are mostly server-based, where the server informs the caches about updates,
whereas Pull-based approaches are client-based, where the client asks the server to
update or validate its cached data. Finally, in hybrid mechanisms the server pushes
the updates or the clients pull them
DISADVANTAGES OF EXISTING SYSTEM:
The major issue that faces client cache management concerns the
maintenance of data consistency between the cache client and the data
source. All cache consistency algorithms seek to increase the probability of
serving from the cache data items that are identical to those on the server.
However, achieving strong consistency, where cached items are identical to
those on the server, requires costly communications with the server to
validate (renew) cached items, considering the resource limited mobile
devices and the wireless environments they operate in.
PROPOSED SYSTEM:
In this paper, we propose a pull-based algorithm that implements adaptive TTL,
piggybacking, and prefetching, and provides near strong consistency guarantees.
Cached data items are assigned adaptive TTL values that correspond to their
update rates at the data source. Expired items as well as nonexpired ones but meet
certain criteria are grouped in validation requests to the data source, which in turn
sends the cache devices the actual items that have changed, or invalidates them,
based on their request rates. This approach, which we call distributed cache
invalidation mechanism (DCIM), works on top of the COACS cooperative caching
architecture.
ADVANTAGES OF PROPOSED SYSTEM:
 TTL algorithms are popular due to their simplicity, sufficiently good
performance, and flexibility to assign TTL values to individual data items.
 Also, they are attractive in mobile environments because of limited device
energy and network bandwidth and frequent device disconnections.
 TTL algorithms are also completely client based and require minimal server
functionality. From this perspective, TTL-based algorithms are more
practical to deploy and are more scalable.
 This is the first complete client side approach employing adaptive TTL and
achieving superior availability, delay, and traffic performance.
SYSTEM ARCHITECTURE:
Overview of DCIM basic design.
Interactions between nodes in a DCIM system.
ALGORITHMS USED:
 Algorithm 1- Decision flow at the server.
 Algorithm 2- Inner loop and outer loop (shaded part) functions.
Decision flow at the server.
Inner loop and outer loop (shaded part) functions.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB(min)
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior Member, IEEE-
“DCIM: Distributed Cache Invalidation Method for Maintaining Cache
Consistency in Wireless Mobile Networks”- IEEE TRANSACTIONS ON
MOBILE COMPUTING VOL. 12, NO. 4, APRIL 2013.

Mais conteúdo relacionado

Mais procurados

Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesDistributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesPapitha Velumani
 
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
JPD1405  Distributed, Concurrent, and Independent Access to Encrypted Cloud D...JPD1405  Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...chennaijp
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Mumbai Academisc
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPapitha Velumani
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemIEEEFINALYEARPROJECTS
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...IJCSIS Research Publications
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems1crore projects
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSNexgen Technology
 
distributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databasesdistributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databasesswathi78
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksRc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksLogicMindtech Nologies
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach toIJCNCJournal
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistencyijfcstjournal
 

Mais procurados (15)

Distributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databasesDistributed, concurrent, and independent access to encrypted cloud databases
Distributed, concurrent, and independent access to encrypted cloud databases
 
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
JPD1405  Distributed, Concurrent, and Independent Access to Encrypted Cloud D...JPD1405  Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
JPD1405 Distributed, Concurrent, and Independent Access to Encrypted Cloud D...
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Distributed, concurrent, and independ...
 
Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...Performance of a speculative transmission scheme for scheduling latency reduc...
Performance of a speculative transmission scheme for scheduling latency reduc...
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
Heterogeneous Networks of Remote Monitoring with High Availability and Resili...
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing SystemsProvable Multicopy Dynamic Data Possession in Cloud Computing Systems
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMSPROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
 
distributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databasesdistributed, concurrent, and independent access to encrypted cloud databases
distributed, concurrent, and independent access to encrypted cloud databases
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networksRc maca receiver-centric mac protocol for event-driven wireless sensor networks
Rc maca receiver-centric mac protocol for event-driven wireless sensor networks
 
A smart clustering based approach to
A smart clustering based approach toA smart clustering based approach to
A smart clustering based approach to
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Real time eventual consistency
Real time eventual consistencyReal time eventual consistency
Real time eventual consistency
 

Destaque

A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...JPINFOTECH JAYAPRAKASH
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...JPINFOTECH JAYAPRAKASH
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...JPINFOTECH JAYAPRAKASH
 
Qos ranking prediction for cloud services
Qos ranking prediction for cloud servicesQos ranking prediction for cloud services
Qos ranking prediction for cloud servicesJPINFOTECH JAYAPRAKASH
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentJPINFOTECH JAYAPRAKASH
 
Optimal client server assignment for internet distributed systems
Optimal client server assignment for internet distributed systemsOptimal client server assignment for internet distributed systems
Optimal client server assignment for internet distributed systemsJPINFOTECH JAYAPRAKASH
 
Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...JPINFOTECH JAYAPRAKASH
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...JPINFOTECH JAYAPRAKASH
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationJPINFOTECH JAYAPRAKASH
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationJPINFOTECH JAYAPRAKASH
 
Mobi sync efficient time synchronization for mobile underwater sensor networks
Mobi sync efficient time synchronization for mobile underwater sensor networksMobi sync efficient time synchronization for mobile underwater sensor networks
Mobi sync efficient time synchronization for mobile underwater sensor networksJPINFOTECH JAYAPRAKASH
 
An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...JPINFOTECH JAYAPRAKASH
 
A decentralized service discovery approach on peer to-peer networks
A decentralized service discovery approach on peer to-peer networksA decentralized service discovery approach on peer to-peer networks
A decentralized service discovery approach on peer to-peer networksJPINFOTECH JAYAPRAKASH
 
Protecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymizationProtecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymizationJPINFOTECH JAYAPRAKASH
 
Cloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudCloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudJPINFOTECH JAYAPRAKASH
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesJPINFOTECH JAYAPRAKASH
 

Destaque (17)

A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...A method for mining infrequent causal associations and its application in fin...
A method for mining infrequent causal associations and its application in fin...
 
A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...A privacy leakage upper bound constraint based approach for cost-effective pr...
A privacy leakage upper bound constraint based approach for cost-effective pr...
 
A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...A system for denial of-service attack detection based on multivariate correla...
A system for denial of-service attack detection based on multivariate correla...
 
Qos ranking prediction for cloud services
Qos ranking prediction for cloud servicesQos ranking prediction for cloud services
Qos ranking prediction for cloud services
 
Privacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignmentPrivacy preserving data sharing with anonymous id assignment
Privacy preserving data sharing with anonymous id assignment
 
Optimal client server assignment for internet distributed systems
Optimal client server assignment for internet distributed systemsOptimal client server assignment for internet distributed systems
Optimal client server assignment for internet distributed systems
 
Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...Security analysis of a single sign on mechanism for distributed computer netw...
Security analysis of a single sign on mechanism for distributed computer netw...
 
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...A neighbor coverage based probabilistic rebroadcast for reducing routing over...
A neighbor coverage based probabilistic rebroadcast for reducing routing over...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Optimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualizationOptimizing cloud resources for delivering iptv services through virtualization
Optimizing cloud resources for delivering iptv services through virtualization
 
2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles2013 2014 ieee dotnet project titles
2013 2014 ieee dotnet project titles
 
Mobi sync efficient time synchronization for mobile underwater sensor networks
Mobi sync efficient time synchronization for mobile underwater sensor networksMobi sync efficient time synchronization for mobile underwater sensor networks
Mobi sync efficient time synchronization for mobile underwater sensor networks
 
An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...An efficient and robust addressing protocol for node auto configuration in ad...
An efficient and robust addressing protocol for node auto configuration in ad...
 
A decentralized service discovery approach on peer to-peer networks
A decentralized service discovery approach on peer to-peer networksA decentralized service discovery approach on peer to-peer networks
A decentralized service discovery approach on peer to-peer networks
 
Protecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymizationProtecting sensitive labels in social network data anonymization
Protecting sensitive labels in social network data anonymization
 
Cloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloudCloud ftp a case study of migrating traditional applications to the cloud
Cloud ftp a case study of migrating traditional applications to the cloud
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 

Semelhante a Dcim distributed cache invalidation method for maintaining cache consistency in wireless mobile networks

JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...IEEEGLOBALSOFTTECHNOLOGIES
 
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...ambitlick
 
Cpu provisioning algorithms for service differentiation in cloud based enviro...
Cpu provisioning algorithms for service differentiation in cloud based enviro...Cpu provisioning algorithms for service differentiation in cloud based enviro...
Cpu provisioning algorithms for service differentiation in cloud based enviro...ieeepondy
 
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...IJMER
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSNexgen Technology
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers acrossnexgentech15
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacentersnexgentechnology
 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistencyPapitha Velumani
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksJPINFOTECH JAYAPRAKASH
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...IEEEFINALSEMSTUDENTPROJECTS
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...inventy
 
pack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction systempack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction systemswathi78
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemJPINFOTECH JAYAPRAKASH
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstracttsysglobalsolutions
 

Semelhante a Dcim distributed cache invalidation method for maintaining cache consistency in wireless mobile networks (20)

JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
Second review
Second reviewSecond review
Second review
 
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Cpu provisioning algorithms for service differentiation in cloud based enviro...
Cpu provisioning algorithms for service differentiation in cloud based enviro...Cpu provisioning algorithms for service differentiation in cloud based enviro...
Cpu provisioning algorithms for service differentiation in cloud based enviro...
 
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
 
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERSORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
ORCHESTRATING BULK DATA TRANSFERS ACROSS GEO-DISTRIBUTED DATACENTERS
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
Orchestrating Bulk Data Transfers across Geo-Distributed Datacenters
 
Consistency as a service auditing cloud consistency
Consistency as a service  auditing cloud consistencyConsistency as a service  auditing cloud consistency
Consistency as a service auditing cloud consistency
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networks
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
2014 IEEE JAVA CLOUD COMPUTING PROJECT A stochastic model to investigate data...
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
pack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction systempack prediction-based cloud bandwidth and cost reduction system
pack prediction-based cloud bandwidth and cost reduction system
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
Pp1t
Pp1tPp1t
Pp1t
 
pp1t
pp1tpp1t
pp1t
 
Pp1t
Pp1tPp1t
Pp1t
 

Último

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17Celine George
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmStan Meyer
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxMichelleTuguinay1
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptxmary850239
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 

Último (20)

How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17How to Fix XML SyntaxError in Odoo the 17
How to Fix XML SyntaxError in Odoo the 17
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Oppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and FilmOppenheimer Film Discussion for Philosophy and Film
Oppenheimer Film Discussion for Philosophy and Film
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptxDIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
DIFFERENT BASKETRY IN THE PHILIPPINES PPT.pptx
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx4.11.24 Poverty and Inequality in America.pptx
4.11.24 Poverty and Inequality in America.pptx
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 

Dcim distributed cache invalidation method for maintaining cache consistency in wireless mobile networks

  • 1. DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency In Wireless Mobile Networks ABSTRACT: This paper proposes distributed cache invalidation mechanism (DCIM), a client- based cache consistency scheme that is implemented on top of a previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes cache the queries and the addresses of the nodes that store the responses to these queries. We have also previously proposed a server-based consistency scheme, named SSUM, whereas in this paper, we introduce DCIM that is totally client-based. DCIM is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides near strong consistency capabilities. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source, where items with expired TTL values are grouped in validation requests to the data source to refresh them, whereas unexpired ones but with high request rates are prefetched from the server. In this paper, DCIM is analyzed to assess the delay and bandwidth gains (or costs) when compared to polling every time and push- based schemes. DCIM was also implemented using ns2, and compared against client-based and server-based schemes to assess its performance experimentally. The consistency ratio, delay, and overhead traffic are reported versus several
  • 2. variables, where DCIM showed to be superior when compared to the other systems. EXISTING SYSTEM: The cache consistency mechanisms in the literature can be grouped into three main categories: push based, pull based, and hybrid approaches. Push-based mechanisms are mostly server-based, where the server informs the caches about updates, whereas Pull-based approaches are client-based, where the client asks the server to update or validate its cached data. Finally, in hybrid mechanisms the server pushes the updates or the clients pull them DISADVANTAGES OF EXISTING SYSTEM: The major issue that faces client cache management concerns the maintenance of data consistency between the cache client and the data source. All cache consistency algorithms seek to increase the probability of serving from the cache data items that are identical to those on the server. However, achieving strong consistency, where cached items are identical to those on the server, requires costly communications with the server to
  • 3. validate (renew) cached items, considering the resource limited mobile devices and the wireless environments they operate in. PROPOSED SYSTEM: In this paper, we propose a pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source. Expired items as well as nonexpired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed, or invalidates them, based on their request rates. This approach, which we call distributed cache invalidation mechanism (DCIM), works on top of the COACS cooperative caching architecture.
  • 4. ADVANTAGES OF PROPOSED SYSTEM:  TTL algorithms are popular due to their simplicity, sufficiently good performance, and flexibility to assign TTL values to individual data items.  Also, they are attractive in mobile environments because of limited device energy and network bandwidth and frequent device disconnections.  TTL algorithms are also completely client based and require minimal server functionality. From this perspective, TTL-based algorithms are more practical to deploy and are more scalable.  This is the first complete client side approach employing adaptive TTL and achieving superior availability, delay, and traffic performance. SYSTEM ARCHITECTURE:
  • 5. Overview of DCIM basic design.
  • 6. Interactions between nodes in a DCIM system.
  • 7. ALGORITHMS USED:  Algorithm 1- Decision flow at the server.  Algorithm 2- Inner loop and outer loop (shaded part) functions. Decision flow at the server.
  • 8.
  • 9. Inner loop and outer loop (shaded part) functions. SYSTEM CONFIGURATION:- HARDWARE CONFIGURATION:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB(min)  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language)
  • 10. REFERENCE: Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior Member, IEEE- “DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks”- IEEE TRANSACTIONS ON MOBILE COMPUTING VOL. 12, NO. 4, APRIL 2013.