scispace - formally typeset
Search or ask a question
Proceedings ArticleDOI

Energy-efficient caching for wireless mobile computing

26 Feb 1996-pp 336-343
TL;DR: An energy-efficient cache invalidation method, called GCORE (Grouping with COld update-set REtention), that allows a mobile computer to operate in a disconnected mode to save the battery while still retaining most of the caching benefits after a reconnection is presented.
Abstract: Caching can reduce the bandwidth requirement in a mobile computing environment. However, due to battery power limitations, a wireless mobile computer may often be forced to operate in a doze (or even totally disconnected) mode. As a result, the mobile computer may miss some cache invalidation reports broadcast by a server, forcing it to discard the entire cache contents after waking up. In this paper, we present an energy-efficient cache invalidation method, called GCORE (Grouping with COld update-set REtention), that allows a mobile computer to operate in a disconnected mode to save the battery while still retaining most of the caching benefits after a reconnection. We present an efficient implementation of GCORE and conduct simulations to evaluate its caching effectiveness. The results show that GCORE can substantially improve mobile caching by reducing the communication bandwidth (or energy consumption) for query processing.
Citations
More filters
Journal ArticleDOI
TL;DR: A proposed relay-peer-based cache consistency protocol offers a generic and flexible method for carrying out cache invalidation in mobile wireless environments.
Abstract: The trend toward wireless communications and advances in mobile technologies are increasing consumer demand for ubiquitous access to Internet-based information and services. A 3D framework provides a basis for designing, analyzing, and evaluating strategies to address data consistency issues in mobile wireless environments. A proposed relay-peer-based cache consistency protocol offers a generic and flexible method for carrying out cache invalidation

85 citations

Book ChapterDOI
01 Feb 2018
TL;DR: The recent edge computing techniques along with the powerful caching strategies at the edge are surveyed and a roadmap for 5G and beyond wireless networks in the context of emerging applications is provided.
Abstract: The enormous increase in powerful mobile devices has created hype for mobile data traffic. The demand for high definition images and good quality video streaming for the mobile users has constantly being escalated over the recent decade. In particular, the newly emerging mobile Augmented Reality and Virtual Reality (AR/VR) applications are anticipated to be among the most demanding applications over wireless networks so far. The architecture of the cellular networks has been centralized over the years, which makes the wireless link capacity, bandwidth and backhaul network difficult to cope with the explosive growth in the mobile user traffic. Along with the rise in overall network traffic, mobile users tend to seek similar types of data at different time instants creating a bottleneck in the backhaul link. To overcome such challenges in a network, emerging techniques of caching the popular content and performing computation at the edge are gaining importance. The emergence of such techniques for near future 5G networks would pose less pressure on the backhaul links as well as the cloud servers, thereby, reducing the end-to-end latency of AR/VR applications. This paper surveys the recent edge computing techniques along with the powerful caching strategies at the edge and provides a roadmap for 5G and beyond wireless networks in the context of emerging applications.

81 citations


Cites background from "Energy-efficient caching for wirele..."

  • ...According to [24] cache consistency is difficult to enforce when the mobile devices are powered off....

    [...]

Proceedings ArticleDOI
27 Jan 2003
TL;DR: A generalized cost function for cache replacement algorithms for mobile environment that is general and can be used for various performance metrics by making the necessary changes and significantly improves the performance.
Abstract: Caching frequently accessed data items on the client side is an effective technique to improve system performance in a mobile environment. Due to cache size limitations, cache replacement algorithms are used to find a suitable subset of items for eviction from the cache. In this paper, we propose a generalized cost function for cache replacement algorithms for mobile environment. The distinctive feature of our cost function is that it is general and it can be used for various performance metrics by making the necessary changes. To demonstrate the practical effectiveness of the general cost function, we derive two specific functions to be evaluated by setting two different targets: minimizing the query delay and minimizing the downlink traffic. Detailed experiments are carried out to evaluate the proposed methodology. Compared to previous schemes, our algorithm significantly improves the performance in terms of query delay or in terms of bandwidth utilization depending on the targets.

79 citations


Cites background from "Energy-efficient caching for wirele..."

  • ...Many solutions[14,16,23]are proposed to address the long disconnection problem, and Hu et al....

    [...]

Proceedings ArticleDOI
Takahiro Hara1
04 Nov 2002
TL;DR: This paper proposes three caching strategies in which clients cooperatively cache broadcast data items that shorten the average response time for data access by replacing cached items based on their access frequencies, the network topology, and the time remaining until each item is broadcast next.
Abstract: Recent advances in computer and wireless communication technologies have increased interest in push-based information systems in which a server repeatedly broadcasts data to clients through a broadband channel. In this paper, assuming an environment where clients in push-based information systems construct ad hoc networks, we propose three caching strategies in which clients cooperatively cache broadcast data items. These strategies shorten the average response time for data access by replacing cached items based on their access frequencies, the network topology, and the time remaining until each item is broadcast next. We also show the results of simulation experiments conducted to evaluate the performance of our proposed strategies.

74 citations


Cites background from "Energy-efficient caching for wirele..."

  • ...In the research field of database systems in mobile computing environments, several strategies for replicating or caching data have been proposed[6, 9, 19, 21, 23, 29, 34]....

    [...]

Journal ArticleDOI
TL;DR: The fundamental research challenges particular to mobile database computing are surveyed, some of the proposed solutions are reviewed and some the upcoming research challenges are identified.

73 citations


Cites methods from "Energy-efficient caching for wirele..."

  • ...[84] propose a technique to decide whether some items in the cache can still be used by the MU even after it is connected to the server....

    [...]

References
More filters
Proceedings Article
01 Jan 1995
TL;DR: In this paper, a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance is presented, and the authors determine that for the units which are often disconnected (sleepers) the best cache invalidization strategy is based on signatures previously used for efficient file comparison.
Abstract: In the mobile wireless computing environment of the future a large number of users equipped with low powered palm-top machines will query databases over the wireless communication channels. Palmtop based units will often be disconnected for prolonged periods of time due to the battery power saving measures; palmtops will also frequencly relocate between different cells and connect to different data servers at different times. Caching of frequently accessed data items will be an important technique that will reduce contention on the narrow bandwidth wireless channel. However, cache invalidation strategies will be severely affected by the disconnection and mobility of the clients. The server may no longer know which clients are currently residing under its cell and which of them are currently on. We propose a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance. We determine that for the units which are often disconnected (sleepers) the best cache invalidation strategy is based on signatures previously used for efficient file comparison. On the other hand, for units which are connected most of the time (workaholics), the best cache invalidation strategy is based on the periodic broadcast of changed data items.

509 citations

Proceedings ArticleDOI
24 May 1994
TL;DR: A taxonomy of different cache invalidation strategies is proposed and it is determined that for the units which are often disconnected (sleepers) the best cache invalidations strategy is based on signatures previously used for efficient file comparison, and for units which is connected most of the time (workaholics), the best Cache invalidation strategy isbased on the periodic broadcast of changed data items.
Abstract: In the mobile wireless computing environment of the future a large number of users equipped with low powered palm-top machines will query databases over the wireless communication channels. Palmtop based units will often be disconnected for prolonged periods of time due to the battery power saving measures; palmtops will also frequencly relocate between different cells and connect to different data servers at different times. Caching of frequently accessed data items will be an important technique that will reduce contention on the narrow bandwidth wireless channel. However, cache invalidation strategies will be severely affected by the disconnection and mobility of the clients. The server may no longer know which clients are currently residing under its cell and which of them are currently on. We propose a taxonomy of different cache invalidation strategies and study the impact of client's disconnection times on their performance. We determine that for the units which are often disconnected (sleepers) the best cache invalidation strategy is based on signatures previously used for efficient file comparison. On the other hand, for units which are connected most of the time (workaholics), the best cache invalidation strategy is based on the periodic broadcast of changed data items.

454 citations

Proceedings ArticleDOI
24 May 1994
TL;DR: This work describes two methods, (1,m) Indexing and Distributed Indexing, for organizing and accessing broadcast data and demonstrates that the proposed algorithms lead to significant improvement of battery life, while retaining a low access time.
Abstract: We consider wireless broadcasting of data as a way of disseminating information to a massive number of users. Organizing and accessing information on wireless communication channels is different from the problem of organizing and accessing data on the disk. We describe two methods, (1,m) Indexing and Distributed Indexing, for organizing and accessing broadcast data. We demonstrate that the proposed algorithms lead to significant improvement of battery life, while retaining a low access time.

421 citations

Journal ArticleDOI
TL;DR: The author begins by discussing the background, defining key terms and showing how wireless information systems can be viewed as a natural evolution of computing's relentless march toward greater distribution and ubiquity of access.
Abstract: The author begins by discussing the background, defining key terms and showing how wireless information systems can be viewed as a natural evolution of computing's relentless march toward greater distribution and ubiquity of access. Next, the research issues faced by designers of wireless information systems are detailed, and some large-scale engineering challenges for such designers are presented. The existing cellular system architecture, evolved from telephony, is compared with an alternative architecture more closely integrated with a computer networking view of wireless systems. Existing wireless systems are reviewed, and the final section presents the author's summary and conclusions, and charts the future of wireless information systems. >

321 citations

Trending Questions (1)
How to clear browser cache in Robot Framework?

As a result, the mobile computer may miss some cache invalidation reports broadcast by a server, forcing it to discard the entire cache contents after waking up.