Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Cache System to Minimize Network Contention in Mobile Ad Hoc Networks

M. Bagirathy Nayagi, Dr.V. Kavitha

Abstract


This paper introduces a new caching system for Mobile Ad Hoc Networks (MANETs). In proposed method a cache consistency scheme for caching the database data in MANET is implemented, which enable the server to be aware of the cache distribution in the MANET, making the data items consistent with their version at the server and adapting the cache update process to the data rate at the server relative to the request rate by the clients. In this server- based scheme the queries that are submitted by requesting nodes are stored in special nodes, called query directories (QDs), and use these queries to locate the data (responses) that are stored in the nodes that requested them, called caching nodes (CNs). This system implements methods to handle disconnections of CN nodes from the network and to control how the cache of each node is updated or discarded when it returns to the network. So the overall design provides a complete caching system in which the server sends to the client’s selective updates that adapt to their needs this reduces wireless traffic in MANET.

Keywords


Cache Consistency, Data Caching, Database Queries, Distributed Cache, MANET Server-Based Approach.

Full Text:

PDF

References


H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and Adaptive Caching System for MANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961- 977, Aug. 2008.

H. Artail and K. Mershad, “SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 9, no. 6, pp.778-795, June 2010.

H. Artail and K. Mershad, “MDPF: Minimum Distance Packet Forwarding for Search Applications in Mobile Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 8, no. 10, pp. 1412- 1426, Oct. 2009.

H. Artail and K. Mershad, “SSUM: Smart Server Update Mechanism for Maintaining Cache Consistency in Mobile Environments,” IEEE Trans. Mobile Computing, vol. 9, no. 6, pp.778-795, June 2010.

O. Bahat and A. Makowski, “Measuring Consistency in TTL Based Caches,” Performance Evaluation, vol. 62, pp. 439-455, 2005.

D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies for Mobile Environments,” Proc. ACM SIGMOD, pp. 1- 12, May 1994.

C. Bettstetter and J. Eberspacher, “Hop Distances in Homogeneous Ad Hoc Networks,” IEEE Proc. 57th IEEE Semiann. Vehicular Technology Conf., vol. 4, pp. 2286-2290, Apr. 2003.

N.A. Boudriga and M.S. Obaidat, “Fault and Intrusion Tolerance in Wireless Ad Hoc Networks,” Proc. IEEE Wireless Comm. And Networking Conf. (WCNC), vol. 4, pp. 2281-2286, 2005.

J. Cai and K. Tan, “Energy-Efficient Selective Cache Invalidation,” Wireless Networks J., vol. 5, no. 6, pp. 489-502, Dec. 1999.

J. Cao, Y. Zhang, L. Xie, and G. Cao, “Consistency of Cooperative Caching in Mobile Peer-to-Peer Systems over MANETs,” Proc. Third Int’l Workshop Mobile Distributed Computing, vol. 6, pp. 573- 579, 2005.

G. Cao, “A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 5, pp. 1251-1265, Sept. 2003.

P. Cao and C. Liu, “Maintaining Strong Cache Consistency in the World-Wide Web,” IEEE Trans. Computers, vol. 47, no. 4, pp. 445- 457, Apr. 1998.

Y. Chung and C. Hwang, “Transactional Cache Management with Aperiodic Invalidation Scheme in Mobile Environments,” Advances in Computing Science, pp. 50-61, Springer, 1999.

A. Elmagarmid, J. Jing, A. Helal, and C. Lee, “Scalable Cache Invalidation Algorithms for Mobile Data Access,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 6, pp. 1498-1511, Nov. 2003.

P. Gupta and P. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, 2000.

H. Jin, J. Cao, and S. Feng, “A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs,” Proc. Third IFIP Int’l Conf. Embedded and Ubiquitous Computing, Dec. 2007.

IEEE Standard 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE, 1999.

J. Jing, A. Elmagarmid, A. Helal, and R. Alonso, “Bit-Sequences: An Adaptive Cache Invalidation Method in Mobile Client/Server Environments,” Mobile Networks and Applications, vol. 15, no. 2, pp. 115-127, 1997.

J. Jung, A.W. Berger, and H. Balakrishnan, “Modeling TTL-Based Internet Caches,” Proc. IEEE INFOCOM, Mar. 2003.

X. Kai and Y. Lu, “Maintain Cache Consistency in Mobile Database Using Dynamical Periodical Broadcasting Strategy,” Proc. Second Int’l Conf. Machine Learning and Cybernetics, pp. 2389- 2393, 2003.

B. Krishnamurthy and C.E. Wills, “Piggyback Server Invalidation for Proxy Cache Coherency,” Proc. Seventh World Wide Web (WWW) Conf., Apr. 1998.

B. Krishnamurthy and C.E. Wills, “Study of Piggyback Cache Validation for Proxy Caches in the World Wide Web,” Proc. USENIX Symp. Internet Technologies and Systems, Dec. 1997.

D. Li, P. Cao, and M. Dahlin, “WCIP: Web Cache Invalidation Protocol,” IETF Internet Draft, http://tools.ietf.org/html/draftdanli- wrec-wcip-01, Mar. 2001.

W. Li, E. Chan, Y. Wang, and D. Chen, “Cache Invalidation Strategies for Mobile Ad Hoc Networks,” Proc. Int’l Conf. Parallel Processing, Sept. 2007.

S. Lim, W.C. Lee, G. Cao, and C.R. Das, “Performance Comparison of Cache Invalidation Strategies for Internet-Based Mobile-Ad Hoc Networks,” Proc. IEEE Int’l Conf. Mobile Ad-Hoc and Sensor Systems, pp. 104-113, Oct. 2004.

S. Lim, W. Lee, G. Cao, and C. Das, “A Novel Caching Scheme for Internet Based Mobile Ad Hoc Networks Performance,” Ad Hoc Networks, vol. 4, no. 2, pp. 225-239, 2006

M.N. Lima, A.L. dos Santos, and G. Pujolle, “A Survey of Survivability in Mobile Ad Hoc Networks,” IEEE Comm. Surveys and Tutorials, vol. 11, no. 1, pp. 66-77, First Quarter 2009.

H. Maalouf and M. Gurcan, “Minimisation of the Update Response Time in a Distributed Database System,” Performance Evaluation, vol. 50, no. 4, pp. 245-266, 2002.

P. Papadimitratos and Z.J. Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,” Proc. ACM Workshop Wireless Security (WiSe ’03), pp. 41-50, 2003.

J.P. Sheu, C.M. Chao, and C.W. Sun, “A Clock Synchronization Algorithm for Multi-Hop Wireless Ad Hoc Networks,” Proc. 24th Int’l Conf. Distributed Computing Systems, pp. 574-581, 2004.

W. Stallings, Cryptography and Network Security, fourth ed. Prentice Hall, 2006.

D. Wessels, “Squid Internet Object Cache,” http://www.squid-cache.org, Aug. 1998.

J. Xu, X. Tang, and D. Lee, “Performance Analysis of Location- Dependent Cache Invalidation Schemes for Mobile Environments,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 2, pp. 474-488, Feb. 2003.

L. Yin, G. Cao, and Y. Cai, “A Generalized Target Driven Cache Replacement Policy for Mobile Environments,” Proc. Int’l Symp. Applications and the Internet (SAINT ’03), Jan. 2003.

L. Yin and G. Cao, “Supporting Cooperative Caching in Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 1, pp. 77-89, 2006.

J. Yuen, E. Chan, K. Lain, and H. Leung, “Cache Invalidation Scheme for Mobile Computing Systems with Real-Time Data,” SIGMOD Record, vol. 29, no. 4, pp. 34-39, Dec. 2000.

D. Zhou and T.H. Lai, “An Accurate and Scalable Clock Synchronization Protocol for IEEE 802.11-Based Multihop Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 12, pp. 1797-1808, Dec. 2007.

G. Zipf, Human Behavior and the Principle of Least Effort. Addison- Wesley, 1949.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.