Energy-Efficient Data Caching and Prefetching for Mobile Devices
This presentation is the property of its rightful owner.
Sponsored Links
1 / 41

P76934408 邱仁傑 PowerPoint PPT Presentation


  • 60 Views
  • Uploaded on
  • Presentation posted in: General

Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility Huaping Shen, Mohan Kumar, Sajal K. Das, and Zhijun Wang. P76934408 邱仁傑. Outline. Scalable Asynchronous Cache Consistency Scheme (SACCS) Analytical Model for Utility GD-LU Cache Replacement Algorithm

Download Presentation

P76934408 邱仁傑

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


P76934408

Energy-Efficient Data Caching and Prefetching for Mobile DevicesBased on UtilityHuaping Shen, Mohan Kumar, Sajal K. Das, and Zhijun Wang

P76934408 邱仁傑


Outline

Outline

  • Scalable Asynchronous Cache Consistency Scheme (SACCS)

  • Analytical Model for Utility

  • GD-LU Cache Replacement Algorithm

  • GD-LU Passive Prefetching

  • Performance Evaluation


Saccs 1 6

SACCS(1/6)

  • SACCS maintain data consistency for mobile computing systems. SACCS relies on three key features:

  • (1) Use of flag bits at server and mobile device's cache to maintain cache consistency

  • (2) Use of an identifier for each entry in mobile device's cache after its invalidation

  • (3) Rendering of all valid entries of a mobile device's cache to uncertainstate upon wake up.


Saccs 2 6

SACCS(2/6)

SERVER:

  • Each data item in a server is associated with a flag bit.

  • When a data item is retrieved by a mobile device, the corresponding flag bit is set, indicating that a valid copy may be available in the mobile cache.

  • When the data item is updated, the server immediately broadcasts its invalidation report (IR) to mobile devices and resets the flag bit.


Saccs 3 6

SACCS(3/6)

Mobile device:

Each data item in the system is in one of three states: invalidated, certain and uncertain .

  • The invalidatedstate is defined for data items that are not cached at the mobile device.

  • The uncertainstate is defined for data items that are cached at the mobile device, but validation of data items is not confirmed.

  • The certainstate is defined for the data items whose validation is confirmed and can be used to satisfy the application's data request.


Saccs 4 6

SACCS(4/6)

A mobile device is either in an awakeor in a sleepstate

In the awake state (i.e., connected with base station (BS)), mobile device receives the IR

  • It discard the corresponding data items

  • It keep the metadata information (including ID) in local cache.

  • The data items contained in IR will change their status to the invalidated state.


Saccs 5 6

SACCS(5/6)

In the sleep state

  • Disconnection :If mobile devices reconnect to wireless networks from base station

  • Handoff: they move to another cell

    Upon wake up ,mobile devices set all data items in the cache into uncertain state.

    An uncertain entry must be refreshed or checked before its usage.


Saccs 6 6

SACCS(6/6)

If applications request an item that is in uncertain state

  • An uncertain request message is initialized and sent to the base station. The base station maintains the item state for each mobile cache

  • The base station responds with a confirmation message if the data item has not been updated since the mobile last acquired it, otherwise, the whole data item is sent to the mobile.

  • After receiving confirmation message from base station, the uncertain cached data items will change to certain state.


Analytical model for utility 1 12

Analytical Model for Utility(1/12)

  • We assume that data request of mobile applications, data update at the server, mobility handoff and disconnection of mobile devices follow Poisson processes.

  • The following analysis assumes a unicast communication between base station and mobile devices.


Analytical model for utility 2 12

Analytical Model for Utility(2/12)

The notations used in the analysis are listed below:


Analytical model for utility 3 12

Analytical Model for Utility(3/12)

  • The state transitions of each cached data item di in the system between nth and (n + 1)th data requests.

  • Event EV1 : it occurs when the mobile device does not receive any IR for diand therefore di remains in the uncertain state.

  • Event EV2 :The item di moves to invalidate state when an IR for di is received.

  • Event EV3 : it occurs if both the following conditions are satisfied: mobile device does not receive any IR for di, and no handoff and disconnection occur.

  • Event EV4 is the event that changes di from certain to uncertain state, if one handoff or disconnection occurs.

  • Event EV5 stands for the event that di changes to invalidated state from certain state, if there is at least one IR for direceived by the mobile device.


Analytical model for utility 4 12

Analytical Model for Utility(4/12)


Analytical model for utility 5 12

Analytical Model for Utility(5/12)

  • Since we assume that the arrivals of data request, data update, disconnection and handoff are all Poisson processes, the corresponding probability Pi of each event EVi (for 1 · i · 5) is given by Equations (1)-(5).


Analytical model for utility 6 12

Analytical Model for Utility(6/12)

  • Energy consumed by any mobile device for sending, receiving or discarding a message is given by the following linear equation

  • where s is the message size, and m denotes the incremental energy cost associated with message, h is the energy cost for the overhead of message. The latter two parameters, i.e., m and h, are different for sending and receiving.


Analytical model for utility 7 12

Analytical Model for Utility(7/12)

  • The energy cost () of the mobile device's request for an uncertain data item is given by,


Analytical model for utility 8 12

Analytical Model for Utility(8/12)

  • The energy cost () of the mobile device's request for an certain data item is given by,


Analytical model for utility 9 12

Analytical Model for Utility(9/12)

  • At the (n+1)th request, the cache mechanism needs to choose victim data set from certain and uncertain data sets in the cache to make space for an incoming data item dx.

    where is victim data set chosen from the uncertain data set and is victim data set chosen from the certain data set.


Analytical model for utility 10 12

Analytical Model for Utility(10/12)

The energy cost after the (n+1)th request can be expressed in a recursive way as follows:

  • The objective of our replacement policy is to choose the optimal victim data set from the cache to minimize the energy cost after the (n+1)th request.

  • The second term is the increased energy cost as dx is cached at the (n + 1)th request, i.e., dx changes from invalidated state to certain state.

  • The cache mechanism can not change the first two terms


Analytical model for utility 11 12

Analytical Model for Utility(11/12)

  • The last two terms can be minimized as follows:


Analytical model for utility 12 12

Analytical Model for Utility(12/12)

  • In order to minimize the energy cost at mobile devices, at each replacement, we choose the data items with the least utility values according to Equations (8) and (9).


Gd lu cache replacement algorithm 1 2

GD-LU Cache Replacement Algorithm(1/2)


Gd lu cache replacement algorithm 2 2

GD-LU Cache Replacement Algorithm(2/2)


Gd lu passive prefetching algorithm 1 2

GD-LU Passive Prefetching Algorithm(1/2)

  • For broadcast and multicast communications, the data item requested by one mobile device is available for all other mobile devices in the data dissemination channel.

  • A data item whose metadata are kept in the metadata queue may have a higher probability to be requested again by the mobile device,

  • We define relative utility (RU) to evaluate future utility of an item at the mobile device.

    where C is the set of data items in cache, and uj is the utility value of cached data item j.


Gd lu passive prefetching algorithm 2 2

GD-LU Passive Prefetching Algorithm(2/2)


Complexity analysis

Complexity Analysis

GD-LU mechanism : it uses a priority queue of the data items based on their utility values.

  • Handling a cache hit takes O(logN) time where N is the number of data items in the cache.

  • Handling an eviction also requires O(logN) time.

    Passive prefetching algorithm : due to a priority queue management, the it also has a time complexity of O(logN).


Performance metrics

Performance Metrics

  • hit ratio(HR)

  • The metric power per query(PPQ) is defined as the ratio of the total energy consumed by data requests to the number of requests in a given period.

  • stretch (ST) is defined as the ratio of the response time of a request to its service time, where service time is defined as the ratio of the requested item size to the bandwidth.

  • energy stretch(EST) is defined as the product of stretch and the energy consumption of a data request. Clearly, energy stretch refects a performance tradeoff between energy consumption and access latency.


Simulation results

Simulation Results

GD-LU replacement algorithm and compare it with

  • LRU

  • GD-Size(1) sets the cost for each document to 1

  • GD-Size(packets) sets the cost for each document to 2+size=536

  • Min-SAUD under SACCS scheme, we set the cache validation delay (v) as zero for valid data items and set v as the confirmation delay for uncertain data items as we calculate the gain function of Min-SAUD


Gd lu passive prefetching

GD-LU Passive Prefetching


Gd lu passive prefetching1

GD-LU Passive Prefetching

Blind prefetching.


Gd lu passive prefetching2

GD-LU Passive Prefetching


Gd lu passive prefetching3

GD-LU Passive Prefetching

  • We consider EST as the main performance metric for passive prefetching, we can get an optimal value of threshold.


Gd lu passive prefetching4

GD-LU Passive Prefetching

  • We choose the points with minimal energy stretch (Min EST) from Figure 8 as comparison, the energy stretch performance of median utility threshold setting (MU EST) achieves near optimal performance under different cache sizes.

  • This demonstrates that the median relative utility threshold setting is a good heuristic method to achieve optimal performance tradeoff between energy consumption and access latency.


Gd lu replacement effect of cache size

GD-LU Replacement: Effect of Cache Size

  • We ignore passive prefetching scheme in this experiment

  • The goal of Min-SAUD is to improve the stretch performance, data items with small size are preferred since smaller size data items contribute more to the stretch performance.

  • GD-LU endeavors to achieve optimal energy conservation, therefore, the data items that consume more energy are selected to be cached.


Gd lu replacement effect of cache size1

GD-LU Replacement: Effect of Cache Size


Gd lu replacement effect of cache size2

GD-LU Replacement: Effect of Cache Size


Gd lu replacement effect of data update rate

GD-LU Replacement: Effect of data updaterate

  • IR listening dominates the energy consumption for mobile devices.


Gd lu replacement effect of data update rate1

GD-LU Replacement: Effect of data updaterate


Gd lu replacement e ff ect of disconnection frequency

GD-LU Replacement: Effect of disconnectionfrequency

  • This is because the utility function deployed in GD-LU considers connection-disconnection characteristic of mobile devices.

  • A small value of Ts indicates a high disconnection frequency


Gd lu replacement e ff ect of disconnection frequency1

GD-LU Replacement: Effect of disconnectionfrequency


Gd lu replacement e ff ect of disconnection frequency2

GD-LU Replacement: Effect of disconnectionfrequency


  • Login