scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Energy-efficient caching for wireless mobile computing

26 Feb 1996-pp 336-343
TL;DR: An energy-efficient cache invalidation method, called GCORE (Grouping with COld update-set REtention), that allows a mobile computer to operate in a disconnected mode to save the battery while still retaining most of the caching benefits after a reconnection is presented.
Abstract: Caching can reduce the bandwidth requirement in a mobile computing environment. However, due to battery power limitations, a wireless mobile computer may often be forced to operate in a doze (or even totally disconnected) mode. As a result, the mobile computer may miss some cache invalidation reports broadcast by a server, forcing it to discard the entire cache contents after waking up. In this paper, we present an energy-efficient cache invalidation method, called GCORE (Grouping with COld update-set REtention), that allows a mobile computer to operate in a disconnected mode to save the battery while still retaining most of the caching benefits after a reconnection. We present an efficient implementation of GCORE and conduct simulations to evaluate its caching effectiveness. The results show that GCORE can substantially improve mobile caching by reducing the communication bandwidth (or energy consumption) for query processing.
Citations
More filters
BookDOI
01 Feb 2002
TL;DR: H Handbook of Internet Computing pdf eBook copy write by good Handbook of Wireless Networks and Mobile Computing Google Books.
Abstract: If you want to get Handbook of Internet Computing pdf eBook copy write by good Handbook of Wireless Networks and Mobile Computing Google Books. Mobile Computing General. Handbook of Algorithms for Wireless Networking and Mobile Computing by Azzedine Boukerche (Editor). Call Number: TK 5103.2. CITS4419 Mobile and Wireless Computing software projects related to wireless networks, (2) write technical reports and documentation for complex computer.

532 citations

Journal ArticleDOI
TL;DR: This paper is an effort to survey these techniques and to classify this research in a few broad areas in the area of data management in mobile computing.
Abstract: The emergence of powerful portable computers, along with advances in wireless communication technologies, has made mobile computing a reality. Among the applications that are finding their way to the market of mobile computing-those that involve data management-hold a prominent position. In the past few years, there has been a tremendous surge of research in the area of data management in mobile computing. This research has produced interesting results in areas such as data dissemination over limited bandwidth channels, location-dependent querying of data, and advanced interfaces for mobile computers. This paper is an effort to survey these techniques and to classify this research in a few broad areas.

416 citations


Cites background from "Energy-efficient caching for wirele..."

  • ...[70], the problem of discarding caches in mobile computers that have been disconnected for any period of time (sleepers) is addressed....

    [...]

Journal ArticleDOI
TL;DR: The proposed BS algorithm is especially suited for dissemination-based (or “server-push”-based) nomadic information service applications and its critical aspect is its self-adaptability and effectiveness, regardless of the connectivity behavior of the mobile clients.
Abstract: In this paper, we present Bit-Sequences (BS), an adaptive cache invalidation algorithm for client/server mobile environments. The algorithm uses adaptable mechanisms to adjust the size of the invalidation report to optimize the use of a limited communication bandwidth while retaining the effectiveness of cache invalidation. The proposed BS algorithm is especially suited for dissemination-based (or “server-push”-based) nomadic information service applications. The critical aspect of our algorithm is its self-adaptability and effectiveness, regardless of the connectivity behavior of the mobile clients. The performance of BS is analyzed through a simulation study that compares BS's effectiveness with that of a hypothetical optimal cache invalidation algorithm.

230 citations


Cites background or methods from "Energy-efficient caching for wirele..."

  • ...The approach in [17] uses an up-link message to check the status of cached data items other than the recently updated data items....

    [...]

  • ...A similar hybrid approach has also been described in [17]....

    [...]

  • ...The approach in [17] uses an up-link message to check the status of cached data items other than the most recently updated data items....

    [...]

Journal ArticleDOI
TL;DR: Compared to previous IR-based schemes, this scheme can significantly improve the throughput and reduce the query latency, the number of uplink request, and the broadcast bandwidth requirements.
Abstract: Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. Classical cache invalidation strategies are not suitable for mobile environments due to frequent disconnections and mobility of the clients. One attractive cache invalidation technique is based on invalidation reports (IRs). However, the IR-based cache invalidation solution has two major drawbacks, which have not been addressed in previous research. First, there is a long query latency associated with this solution since a client cannot answer the query until the next IR interval. Second, when the server updates a hot data item, all clients have to query the server and get the data from the server separately, which wastes a large amount of bandwidth. In this paper, we propose an IR-based cache invalidation algorithm, which can significantly reduce the query latency and efficiently utilize the broadcast bandwidth. Detailed analytical analysis and simulation experiments are carried out to evaluate the proposed methodology. Compared to previous IR-based schemes, our scheme can significantly improve the throughput and reduce the query latency, the number of uplink request, and the broadcast bandwidth requirements.

210 citations


Cites background or methods from "Energy-efficient caching for wirele..."

  • ...The proposed IR-based algorithm is independent of the cache invalidation strategies and it can be based on any previous IR-based algorithm [3], [12], [16], [29] to deal with the long disconnection problem....

    [...]

  • ...[29] modified the TS scheme to include cache validity checks after reconnection....

    [...]

  • ...However, most of the previous IR-based algorithms [3], [12], [16], [29] concentrate on dealing with the problem of long disconnections, and not much work has been done to address the drawbacks associated with the IR-based algorithms such as long query delay and low bandwidth utilization....

    [...]

  • ...Previous techniques [3], [12], [16], [29] can be used to deal with the long disconnection problem....

    [...]

  • ...Different from previous IR-based algorithms [3], [12], [16], [29], which concentrate on solving the long disconnection problem, our algorithm concentrates on reducing the query latency and efficiently utilizing the broadcast bandwidth....

    [...]

Journal ArticleDOI
TL;DR: In this article, the authors propose three replica allocation methods assuming that each data item is not updated and take into account the access frequency from mobile hosts to each data items and the status of the network connection.
Abstract: In ad hoc networks, due to frequent network partition, data accessibility is lower than that in conventional fixed networks. In this paper, we solve this problem by replicating data items on mobile hosts. First, we propose three replica allocation methods assuming that each data item is not updated. In these three methods, we take into account the access frequency from mobile hosts to each data item and the status of the network connection. Then, we extend the proposed methods by considering aperiodic updates and integrating user profiles consisting of mobile users' schedules, access behavior, and read/write patterns. We also show the results of simulation experiments regarding the performance evaluation of our proposed methods

203 citations

References
More filters
Proceedings Article
01 Jan 1995
TL;DR: In this paper, a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance is presented, and the authors determine that for the units which are often disconnected (sleepers) the best cache invalidization strategy is based on signatures previously used for efficient file comparison.
Abstract: In the mobile wireless computing environment of the future a large number of users equipped with low powered palm-top machines will query databases over the wireless communication channels. Palmtop based units will often be disconnected for prolonged periods of time due to the battery power saving measures; palmtops will also frequencly relocate between different cells and connect to different data servers at different times. Caching of frequently accessed data items will be an important technique that will reduce contention on the narrow bandwidth wireless channel. However, cache invalidation strategies will be severely affected by the disconnection and mobility of the clients. The server may no longer know which clients are currently residing under its cell and which of them are currently on. We propose a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance. We determine that for the units which are often disconnected (sleepers) the best cache invalidation strategy is based on signatures previously used for efficient file comparison. On the other hand, for units which are connected most of the time (workaholics), the best cache invalidation strategy is based on the periodic broadcast of changed data items.

509 citations

Proceedings ArticleDOI
24 May 1994
TL;DR: A taxonomy of different cache invalidation strategies is proposed and it is determined that for the units which are often disconnected (sleepers) the best cache invalidations strategy is based on signatures previously used for efficient file comparison, and for units which is connected most of the time (workaholics), the best Cache invalidation strategy isbased on the periodic broadcast of changed data items.
Abstract: In the mobile wireless computing environment of the future a large number of users equipped with low powered palm-top machines will query databases over the wireless communication channels. Palmtop based units will often be disconnected for prolonged periods of time due to the battery power saving measures; palmtops will also frequencly relocate between different cells and connect to different data servers at different times. Caching of frequently accessed data items will be an important technique that will reduce contention on the narrow bandwidth wireless channel. However, cache invalidation strategies will be severely affected by the disconnection and mobility of the clients. The server may no longer know which clients are currently residing under its cell and which of them are currently on. We propose a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance. We determine that for the units which are often disconnected (sleepers) the best cache invalidation strategy is based on signatures previously used for efficient file comparison. On the other hand, for units which are connected most of the time (workaholics), the best cache invalidation strategy is based on the periodic broadcast of changed data items.

454 citations

Proceedings ArticleDOI
24 May 1994
TL;DR: This work describes two methods, (1,m) Indexing and Distributed Indexing, for organizing and accessing broadcast data and demonstrates that the proposed algorithms lead to significant improvement of battery life, while retaining a low access time.
Abstract: We consider wireless broadcasting of data as a way of disseminating information to a massive number of users. Organizing and accessing information on wireless communication channels is different from the problem of organizing and accessing data on the disk. We describe two methods, (1,m) Indexing and Distributed Indexing, for organizing and accessing broadcast data. We demonstrate that the proposed algorithms lead to significant improvement of battery life, while retaining a low access time.

421 citations

Journal ArticleDOI
TL;DR: The author begins by discussing the background, defining key terms and showing how wireless information systems can be viewed as a natural evolution of computing's relentless march toward greater distribution and ubiquity of access.
Abstract: The author begins by discussing the background, defining key terms and showing how wireless information systems can be viewed as a natural evolution of computing's relentless march toward greater distribution and ubiquity of access. Next, the research issues faced by designers of wireless information systems are detailed, and some large-scale engineering challenges for such designers are presented. The existing cellular system architecture, evolved from telephony, is compared with an alternative architecture more closely integrated with a computer networking view of wireless systems. Existing wireless systems are reviewed, and the final section presents the author's summary and conclusions, and charts the future of wireless information systems. >

321 citations

Trending Questions (1)
How to clear browser cache in Robot Framework?

As a result, the mobile computer may miss some cache invalidation reports broadcast by a server, forcing it to discard the entire cache contents after waking up.