1 / 23

Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments

Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments. Speaker : Hsin-Chin Mao Fu Jen Catholic University Computer Science and Information Engineering Department High Speed Networks Lab 2003/10/28. Outline. Introduction The System Model

amalia
Download Presentation

Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments Speaker : Hsin-Chin Mao Fu Jen Catholic University Computer Science and Information Engineering Department High Speed Networks Lab 2003/10/28

  2. Outline • Introduction • The System Model • Location-Dependent Invalidation Strategies • Location-Dependent Cache Replacement Policies • Simulation Model • Performance Evaluation • Conclusion • References

  3. two common issues in client cache management cache invalidation scheme cache replacement policy location-dependent data location-dependent cache invalidation valid scopes We first introduce two basic location-dependent invalidation schemes Polygonal Endpoints (PE) Approximate Circle (AC) a generic method Cache-Efficiency Based scheme (CEB) Introduction

  4. The System Model • two distinct sets of entities • mobile clients • fixed hosts ( mobile support stations (MSSs)) • data item value from data item • Mobile clients can identify their locations using systems such as the Global Positioning System (GPS) • cache data values on its local disk or in any storage system; fixed sizes and read-only

  5. Location-Dependent Invalidation Strategies • The advantages of the idea that attach complete/partial invalidation information • two situations where validity checking is necessary • cache replacement policies • The Polygonal Endpoints (PE) Scheme • a straightforward way • The Approximate Circle (AC) Scheme • the overhead of this scheme can be minimized • 56 bytes => 12 bytes

  6. Location-Dependent Invalidation Strategies • The Caching-Efficiency-Based (CEB) Method

  7. Location-Dependent Cache Replacement Policies • Data Distance • the distance between the current location of a mobile client and the valid scope of a data value • Valid Scope Area • the geometric area of the valid scope of a data value proposed PA and PAID policies • Probability Area (PA) • Probability Area Inverse Distance (PAID)

  8. Simulation Model • System Execution Model • 110 points randomly distributed in a square Euclidean space • the locations of 185 hospitals in the Southern California area • Server Execution Model • Client Execution Model

  9. Performance Evaluation • Evaluation of Location-Dependent Invalidation Schemes • Evaluation of Cache Replacement Policies • uniform access (θ=0), skewed access(θ=0.5) • Effect of Changing Query Interval • Effect of Changing Moving Interval • Effect of Cache Size • Effect of Combining Different Invalidation and Replacement Schemes

  10. Evaluation of Location-Dependent Invalidation Schemes

  11. Evaluation of Location-Dependent Invalidation Schemes

  12. Evaluation of Location-Dependent Invalidation Schemes

  13. Effect of Changing Query Interval

  14. Effect of Changing Query Interval

  15. Effect of Changing Moving Interval

  16. Effect of Changing Moving Interval

  17. Effect of Cache Size

  18. Effect of Combining Different Invalidation andReplacement Schemes

  19. Conclusions • explored cache invalidation and replacement issues for location-dependent data under a geometric location model • PE, AC, CEB • proposed two cache replacement policies • PA, PAID • future work • location-dependent queries

  20. References • Baihua Zheng, Jianliang Xu, Dik Lun Lee: Cache Invalidation and Replacement Strategies for Location-Dependent Data in Mobile Environments. IEEE Transactions on Computers 51(10): 1141-1153 (2002) • Q. Ren and M.H. Dunham, “Using Semantic Caching to Manage Location Dependent Data in Mobile Computing,” Proc. Sixth Ann. ACM/IEEE Int’l Conf. Mobile Computing and Networking (MobiCom 2000), pp. 210-221, Aug. 2000. • G.K. Zipf, Human Behaviour and the Principle of Least Effort.Addison-Wesley, 1949.

More Related