SlideShare une entreprise Scribd logo
1  sur  11
MAINTAIN CACHE
CONSISTENCY IN MOBILE
NETWORKS BASED ON DCIM
GUIDE NAME:
Mrs.R.Prathiba
(Ass Prof/ECE Dept)

BATCH MEMBERS:
P.Praveenkumar-47210106041
M.Roshni-47210106048
M.Rakeshvar-47210106305
ABSTRACT
• Distributed Cache Invalidation Method is a pull-based algorithm that
implements adaptive time to live (TTL), piggybacking, and prefetching.
• Expired TTL values are grouped in validation requests to the data source to
refresh them and unexpired ones but with high request rates are prefetched
from the server.
• This extend preliminary work to develop a replica node and provide
security for all nodes in DCIM.
INTRODUCTION
•
•
•
•
•
•
•
•

MANET-Mobile Ad Hoc Networks
Formed by wireless hosts which may be mobile
No pre-existing infrastructure
Routes between nodes may potentially contain multiple hops
Nodes act as routers to forward packets for each other
Node mobility may cause the routes change
In MANET environments, data caching is essential because
it increases the ability of mobile devices to access desire data.
In this paper, we propose a pull-based algorithm that
implements adaptive TTL, piggybacking, and prefetching,
and provides near strong consistency guarantees.
BLOCK DIAGRAM

CLIENT

COACS
Caching
architecture

TTL

Piggybacking
and
perfecting

server

Processing

Monitoring

Antenna
mobile groups
DCIM DESIGN & FUNCTION
•

•

•

TTL as a factor multiplied by the time difference between the
query time of the item and its last update time. This factor
determines how much the algorithm is optimistic or
conservative.
The cache piggybacks a list of invalidated documents when
communicating with the server, while in the server piggybacks
a list of updated documents when it communicates with the
cache.
Since pre-fetching data items to save on query delay
constitutes most of the traffic consumption in the network,
pre-fetching only highly requested items helps to limit the
bandwidth consumption in the network.
IMPLEMENTATION OF PULL
BASED ALGORITHM
•
•

•

A pull-based algorithm that implements adaptive TTL,
piggybacking, and prefetching, and provides near strong
consistency guarantees.
Cached data items are assigned adaptive TTL values that
correspond to their update rates at the data source. Expired
items as well as non expired ones but meet certain criteria are
grouped in validation requests to the data source, which in turn
sends the cache devices the actual items that have changed, or
invalidates them, based on their request rates.
It makes use of piggybacking and prefetching to increase the
accuracy of its estimation to reduce both traffic and query
delays. We compared this approach to two pull-based
approaches (fixed TTL and client polling) and to two serverbased approaches .
CLIENT-SERVER UPDATION
•

•

•

The client polling systems, such as those presented in, a cache validation
request is initiated according to a schedule determined by the cache.
There the system is configured with a probability that controls the
validation of the data item from the server or the neighbors when
requested.
Although client poll algorithms have relatively low bandwidth
consumption, their access delay is high considering that each item needs
to be validated upon each request.
LITERATURE SURVEY
Existing System

Proposed System

The cache consistency mechanisms in the
literature can be grouped
into three
main categories: push based, pull based,
and hybrid approaches

A pull-based algorithm that implements
adaptive TTL, piggybacking, and prefetching,
and provides near strong consistency
guarantees.

Push-based mechanisms are mostly serverbased, where the server informs the caches
about updates, whereas Pull-based
approaches are client-based, where the
client asks the server to update or validate
its cached data.

Expired items as well as nonexpired ones but
meet certain criteria are grouped in validation
requests to the data source, which in turn
sends the cache devices the actual items that
have changed, or invalidates them, based on
their request rates. This approach, which we
call distributed cache invalidation mechanism
(DCIM).

Finally, in hybrid mechanisms the server
pushes the updates or the clients pull them

This extend preliminary work to develop a
replica node and provide security for all nodes
in DCIM.
DISADVANTAGES OF EXISTING
SYSTEM
•
•

•

The major issue that faces client cache management
concerns the maintenance of data consistency between
the cache client and the data source.
Requires costly communications with the server to
validate (renew) cached items, considering the resource
limited mobile devices and the wireless environments
they operate in.
Packet losses and traffic is high in server based
consistency.
ADVANTAGES OF PROPOSED
SYSTEM
•

•

TTL algorithms are popular due to their simplicity,
sufficiently good performance, and flexibility to assign
TTL values to individual data items.
Limited device energy and network bandwidth and
then achieving superior availability, delay, and traffic
performance.
REFERENCES
• Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior
Member, IEEE”Distributed Cache Invalidation Method For Maintaining
Cache Consistency in WMN,”Computer, vol. 12,no. 4, April 2013.
• H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman,“COACS: A
Cooperative and Adaptive Caching System forMANETS,” IEEE Trans. Mobile
Computing, vol. 7, no. 8, pp. 961-977, Aug.2008
• W. Zhang and G. Cao, “Defending Against Cache Consistency Attacks in
Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 6, pp. 363-379, 2008.
• Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, “TTL Prediction Schemes
and the Effects of Inter-Update Time Distribution on Wireless
Data Access,” Wireless Networks, vol. 10, pp. 607-619, 2004.
• K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense
Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec.
2012.

Contenu connexe

Tendances

Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
IJERA Editor
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
lily888
 

Tendances (19)

Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
 
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocSecure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...
 
9 gprs
9 gprs9 gprs
9 gprs
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
Routing
RoutingRouting
Routing
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 

En vedette

Cache and consistency in nosql
Cache and consistency in nosqlCache and consistency in nosql
Cache and consistency in nosql
João Gabriel Lima
 
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
hydrologywebsite1
 
Agile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileahAgile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileah
Rae Abileah
 
Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16
James Beers
 
In2thinking conference 2016.psh
In2thinking conference 2016.pshIn2thinking conference 2016.psh
In2thinking conference 2016.psh
pshartman
 
Martin timetable
Martin timetableMartin timetable
Martin timetable
dkv-s
 
南台工作經驗分享會
南台工作經驗分享會南台工作經驗分享會
南台工作經驗分享會
Maria Lin
 
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Esther Seyffarth
 
James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)
James Beers
 

En vedette (20)

Cache and consistency in nosql
Cache and consistency in nosqlCache and consistency in nosql
Cache and consistency in nosql
 
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 
Step By Step.
Step By Step.Step By Step.
Step By Step.
 
Agile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileahAgile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileah
 
Trabajos gimp
Trabajos gimp Trabajos gimp
Trabajos gimp
 
Documentatie 2013
Documentatie 2013Documentatie 2013
Documentatie 2013
 
I love VAMPIRISM...
I love VAMPIRISM...I love VAMPIRISM...
I love VAMPIRISM...
 
Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16
 
Select Fair Sponsorship Deck Frieze Week 2014
Select Fair Sponsorship Deck Frieze Week 2014Select Fair Sponsorship Deck Frieze Week 2014
Select Fair Sponsorship Deck Frieze Week 2014
 
In2thinking conference 2016.psh
In2thinking conference 2016.pshIn2thinking conference 2016.psh
In2thinking conference 2016.psh
 
How not to fail at programming education
How not to fail at programming educationHow not to fail at programming education
How not to fail at programming education
 
Pow séminaire Best of the Best
Pow séminaire Best of the BestPow séminaire Best of the Best
Pow séminaire Best of the Best
 
Martin timetable
Martin timetableMartin timetable
Martin timetable
 
Mentorship by Mathew Olasupo
Mentorship by Mathew OlasupoMentorship by Mathew Olasupo
Mentorship by Mathew Olasupo
 
Cuestionario
CuestionarioCuestionario
Cuestionario
 
南台工作經驗分享會
南台工作經驗分享會南台工作經驗分享會
南台工作經驗分享會
 
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
 
Scala Days 2014: Pitching Typesafe
Scala Days 2014: Pitching TypesafeScala Days 2014: Pitching Typesafe
Scala Days 2014: Pitching Typesafe
 
James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)
 

Similaire à Second review

A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia Applications
ABDELAAL
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 

Similaire à Second review (20)

Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
QOSPPT.2019122-2020131[1].pptx
QOSPPT.2019122-2020131[1].pptxQOSPPT.2019122-2020131[1].pptx
QOSPPT.2019122-2020131[1].pptx
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
 
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
 
A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia Applications
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
ERTOS UNIT6.ppt
ERTOS UNIT6.pptERTOS UNIT6.ppt
ERTOS UNIT6.ppt
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Camp finall
Camp finallCamp finall
Camp finall
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 

Dernier

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

Second review

  • 1. MAINTAIN CACHE CONSISTENCY IN MOBILE NETWORKS BASED ON DCIM GUIDE NAME: Mrs.R.Prathiba (Ass Prof/ECE Dept) BATCH MEMBERS: P.Praveenkumar-47210106041 M.Roshni-47210106048 M.Rakeshvar-47210106305
  • 2. ABSTRACT • Distributed Cache Invalidation Method is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching. • Expired TTL values are grouped in validation requests to the data source to refresh them and unexpired ones but with high request rates are prefetched from the server. • This extend preliminary work to develop a replica node and provide security for all nodes in DCIM.
  • 3. INTRODUCTION • • • • • • • • MANET-Mobile Ad Hoc Networks Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between nodes may potentially contain multiple hops Nodes act as routers to forward packets for each other Node mobility may cause the routes change In MANET environments, data caching is essential because it increases the ability of mobile devices to access desire data. In this paper, we propose a pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees.
  • 5. DCIM DESIGN & FUNCTION • • • TTL as a factor multiplied by the time difference between the query time of the item and its last update time. This factor determines how much the algorithm is optimistic or conservative. The cache piggybacks a list of invalidated documents when communicating with the server, while in the server piggybacks a list of updated documents when it communicates with the cache. Since pre-fetching data items to save on query delay constitutes most of the traffic consumption in the network, pre-fetching only highly requested items helps to limit the bandwidth consumption in the network.
  • 6. IMPLEMENTATION OF PULL BASED ALGORITHM • • • A pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source. Expired items as well as non expired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed, or invalidates them, based on their request rates. It makes use of piggybacking and prefetching to increase the accuracy of its estimation to reduce both traffic and query delays. We compared this approach to two pull-based approaches (fixed TTL and client polling) and to two serverbased approaches .
  • 7. CLIENT-SERVER UPDATION • • • The client polling systems, such as those presented in, a cache validation request is initiated according to a schedule determined by the cache. There the system is configured with a probability that controls the validation of the data item from the server or the neighbors when requested. Although client poll algorithms have relatively low bandwidth consumption, their access delay is high considering that each item needs to be validated upon each request.
  • 8. LITERATURE SURVEY Existing System Proposed System The cache consistency mechanisms in the literature can be grouped into three main categories: push based, pull based, and hybrid approaches A pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees. Push-based mechanisms are mostly serverbased, where the server informs the caches about updates, whereas Pull-based approaches are client-based, where the client asks the server to update or validate its cached data. Expired items as well as nonexpired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed, or invalidates them, based on their request rates. This approach, which we call distributed cache invalidation mechanism (DCIM). Finally, in hybrid mechanisms the server pushes the updates or the clients pull them This extend preliminary work to develop a replica node and provide security for all nodes in DCIM.
  • 9. DISADVANTAGES OF EXISTING SYSTEM • • • The major issue that faces client cache management concerns the maintenance of data consistency between the cache client and the data source. Requires costly communications with the server to validate (renew) cached items, considering the resource limited mobile devices and the wireless environments they operate in. Packet losses and traffic is high in server based consistency.
  • 10. ADVANTAGES OF PROPOSED SYSTEM • • TTL algorithms are popular due to their simplicity, sufficiently good performance, and flexibility to assign TTL values to individual data items. Limited device energy and network bandwidth and then achieving superior availability, delay, and traffic performance.
  • 11. REFERENCES • Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior Member, IEEE”Distributed Cache Invalidation Method For Maintaining Cache Consistency in WMN,”Computer, vol. 12,no. 4, April 2013. • H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman,“COACS: A Cooperative and Adaptive Caching System forMANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug.2008 • W. Zhang and G. Cao, “Defending Against Cache Consistency Attacks in Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 6, pp. 363-379, 2008. • Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, “TTL Prediction Schemes and the Effects of Inter-Update Time Distribution on Wireless Data Access,” Wireless Networks, vol. 10, pp. 607-619, 2004. • K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec. 2012.