SlideShare una empresa de Scribd logo
1 de 11
MAINTAIN CACHE
CONSISTENCY IN MOBILE
NETWORKS BASED ON DCIM
GUIDE NAME:
Mrs.R.Prathiba
(Ass Prof/ECE Dept)

BATCH MEMBERS:
P.Praveenkumar-47210106041
M.Roshni-47210106048
M.Rakeshvar-47210106305
ABSTRACT
• Distributed Cache Invalidation Method is a pull-based algorithm that
implements adaptive time to live (TTL), piggybacking, and prefetching.
• Expired TTL values are grouped in validation requests to the data source to
refresh them and unexpired ones but with high request rates are prefetched
from the server.
• This extend preliminary work to develop a replica node and provide
security for all nodes in DCIM.
INTRODUCTION
•
•
•
•
•
•
•
•

MANET-Mobile Ad Hoc Networks
Formed by wireless hosts which may be mobile
No pre-existing infrastructure
Routes between nodes may potentially contain multiple hops
Nodes act as routers to forward packets for each other
Node mobility may cause the routes change
In MANET environments, data caching is essential because
it increases the ability of mobile devices to access desire data.
In this paper, we propose a pull-based algorithm that
implements adaptive TTL, piggybacking, and prefetching,
and provides near strong consistency guarantees.
BLOCK DIAGRAM

CLIENT

COACS
Caching
architecture

TTL

Piggybacking
and
perfecting

server

Processing

Monitoring

Antenna
mobile groups
DCIM DESIGN & FUNCTION
•

•

•

TTL as a factor multiplied by the time difference between the
query time of the item and its last update time. This factor
determines how much the algorithm is optimistic or
conservative.
The cache piggybacks a list of invalidated documents when
communicating with the server, while in the server piggybacks
a list of updated documents when it communicates with the
cache.
Since pre-fetching data items to save on query delay
constitutes most of the traffic consumption in the network,
pre-fetching only highly requested items helps to limit the
bandwidth consumption in the network.
IMPLEMENTATION OF PULL
BASED ALGORITHM
•
•

•

A pull-based algorithm that implements adaptive TTL,
piggybacking, and prefetching, and provides near strong
consistency guarantees.
Cached data items are assigned adaptive TTL values that
correspond to their update rates at the data source. Expired
items as well as non expired ones but meet certain criteria are
grouped in validation requests to the data source, which in turn
sends the cache devices the actual items that have changed, or
invalidates them, based on their request rates.
It makes use of piggybacking and prefetching to increase the
accuracy of its estimation to reduce both traffic and query
delays. We compared this approach to two pull-based
approaches (fixed TTL and client polling) and to two serverbased approaches .
CLIENT-SERVER UPDATION
•

•

•

The client polling systems, such as those presented in, a cache validation
request is initiated according to a schedule determined by the cache.
There the system is configured with a probability that controls the
validation of the data item from the server or the neighbors when
requested.
Although client poll algorithms have relatively low bandwidth
consumption, their access delay is high considering that each item needs
to be validated upon each request.
LITERATURE SURVEY
Existing System

Proposed System

The cache consistency mechanisms in the
literature can be grouped
into three
main categories: push based, pull based,
and hybrid approaches

A pull-based algorithm that implements
adaptive TTL, piggybacking, and prefetching,
and provides near strong consistency
guarantees.

Push-based mechanisms are mostly serverbased, where the server informs the caches
about updates, whereas Pull-based
approaches are client-based, where the
client asks the server to update or validate
its cached data.

Expired items as well as nonexpired ones but
meet certain criteria are grouped in validation
requests to the data source, which in turn
sends the cache devices the actual items that
have changed, or invalidates them, based on
their request rates. This approach, which we
call distributed cache invalidation mechanism
(DCIM).

Finally, in hybrid mechanisms the server
pushes the updates or the clients pull them

This extend preliminary work to develop a
replica node and provide security for all nodes
in DCIM.
DISADVANTAGES OF EXISTING
SYSTEM
•
•

•

The major issue that faces client cache management
concerns the maintenance of data consistency between
the cache client and the data source.
Requires costly communications with the server to
validate (renew) cached items, considering the resource
limited mobile devices and the wireless environments
they operate in.
Packet losses and traffic is high in server based
consistency.
ADVANTAGES OF PROPOSED
SYSTEM
•

•

TTL algorithms are popular due to their simplicity,
sufficiently good performance, and flexibility to assign
TTL values to individual data items.
Limited device energy and network bandwidth and
then achieving superior availability, delay, and traffic
performance.
REFERENCES
• Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior
Member, IEEE”Distributed Cache Invalidation Method For Maintaining
Cache Consistency in WMN,”Computer, vol. 12,no. 4, April 2013.
• H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman,“COACS: A
Cooperative and Adaptive Caching System forMANETS,” IEEE Trans. Mobile
Computing, vol. 7, no. 8, pp. 961-977, Aug.2008
• W. Zhang and G. Cao, “Defending Against Cache Consistency Attacks in
Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 6, pp. 363-379, 2008.
• Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, “TTL Prediction Schemes
and the Effects of Inter-Update Time Distribution on Wireless
Data Access,” Wireless Networks, vol. 10, pp. 607-619, 2004.
• K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense
Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec.
2012.

Más contenido relacionado

La actualidad más candente

Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
IJERA Editor
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
lily888
 

La actualidad más candente (19)

Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Privacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storagePrivacy preserving public auditing for secure cloud storage
Privacy preserving public auditing for secure cloud storage
 
WSN Routing Protocols
WSN Routing ProtocolsWSN Routing Protocols
WSN Routing Protocols
 
Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...Cooperative load balancing and dynamic channel allocation for cluster based m...
Cooperative load balancing and dynamic channel allocation for cluster based m...
 
Final Year Project IEEE 2015
Final Year Project IEEE 2015Final Year Project IEEE 2015
Final Year Project IEEE 2015
 
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
Data Retrieval Scheduling For Unsynchronized Channel in Wireless Broadcast Sy...
 
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hocSecure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
Secure and Proficient Cross Layer (SPCL) QoS Framework for Mobile Ad-hoc
 
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANETIMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
IMPROVED QUALITY OF SERVICE PROTOCOL FOR REAL TIME TRAFFIC IN MANET
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...Minimum bandwidth reservations for periodic streams in wireless real time sys...
Minimum bandwidth reservations for periodic streams in wireless real time sys...
 
9 gprs
9 gprs9 gprs
9 gprs
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Quality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advancedQuality of service parameter centric resource allocation for lte advanced
Quality of service parameter centric resource allocation for lte advanced
 
Networking project list for java and dotnet
Networking project list for java and dotnetNetworking project list for java and dotnet
Networking project list for java and dotnet
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
Congestionin Data Networks
Congestionin Data NetworksCongestionin Data Networks
Congestionin Data Networks
 
Routing
RoutingRouting
Routing
 
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
INCREASE THE LIFETIME OF WIRELESS SENSOR NETWORKS USING HIERARCHICAL CLUSTERI...
 

Destacado

Cache and consistency in nosql
Cache and consistency in nosqlCache and consistency in nosql
Cache and consistency in nosql
João Gabriel Lima
 
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
hydrologywebsite1
 
Agile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileahAgile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileah
Rae Abileah
 
Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16
James Beers
 
In2thinking conference 2016.psh
In2thinking conference 2016.pshIn2thinking conference 2016.psh
In2thinking conference 2016.psh
pshartman
 
Martin timetable
Martin timetableMartin timetable
Martin timetable
dkv-s
 
南台工作經驗分享會
南台工作經驗分享會南台工作經驗分享會
南台工作經驗分享會
Maria Lin
 
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Esther Seyffarth
 
James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)
James Beers
 

Destacado (20)

Cache and consistency in nosql
Cache and consistency in nosqlCache and consistency in nosql
Cache and consistency in nosql
 
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency...
 
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
Download-manuals-surface water-manual-45howtoreviewmonitoringnetworks
 
Step By Step.
Step By Step.Step By Step.
Step By Step.
 
Agile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileahAgile india women_war_peace_rae_abileah
Agile india women_war_peace_rae_abileah
 
Trabajos gimp
Trabajos gimp Trabajos gimp
Trabajos gimp
 
Documentatie 2013
Documentatie 2013Documentatie 2013
Documentatie 2013
 
I love VAMPIRISM...
I love VAMPIRISM...I love VAMPIRISM...
I love VAMPIRISM...
 
Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16Sleddin' Road_excerpt_7-7-16
Sleddin' Road_excerpt_7-7-16
 
Select Fair Sponsorship Deck Frieze Week 2014
Select Fair Sponsorship Deck Frieze Week 2014Select Fair Sponsorship Deck Frieze Week 2014
Select Fair Sponsorship Deck Frieze Week 2014
 
In2thinking conference 2016.psh
In2thinking conference 2016.pshIn2thinking conference 2016.psh
In2thinking conference 2016.psh
 
How not to fail at programming education
How not to fail at programming educationHow not to fail at programming education
How not to fail at programming education
 
Pow séminaire Best of the Best
Pow séminaire Best of the BestPow séminaire Best of the Best
Pow séminaire Best of the Best
 
Martin timetable
Martin timetableMartin timetable
Martin timetable
 
Mentorship by Mathew Olasupo
Mentorship by Mathew OlasupoMentorship by Mathew Olasupo
Mentorship by Mathew Olasupo
 
Cuestionario
CuestionarioCuestionario
Cuestionario
 
南台工作經驗分享會
南台工作經驗分享會南台工作經驗分享會
南台工作經驗分享會
 
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
Wie funktioniert eigentlich Pentametron? Computerlinguistische Perspektiven a...
 
Scala Days 2014: Pitching Typesafe
Scala Days 2014: Pitching TypesafeScala Days 2014: Pitching Typesafe
Scala Days 2014: Pitching Typesafe
 
James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)James D. Beers CV (5-2-16)
James D. Beers CV (5-2-16)
 

Similar a Second review

A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia Applications
ABDELAAL
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Editor IJMTER
 

Similar a Second review (20)

Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...A novel cache resolution technique for cooperative caching in wireless mobile...
A novel cache resolution technique for cooperative caching in wireless mobile...
 
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
A NOVEL CACHE RESOLUTION TECHNIQUE FOR COOPERATIVE CACHING IN WIRELESS MOBILE...
 
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...Reduce the False Positive and False Negative from Real Traffic with Intrusion...
Reduce the False Positive and False Negative from Real Traffic with Intrusion...
 
Secured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manetsSecured client cache sustain for maintaining consistency in manets
Secured client cache sustain for maintaining consistency in manets
 
QOSPPT.2019122-2020131[1].pptx
QOSPPT.2019122-2020131[1].pptxQOSPPT.2019122-2020131[1].pptx
QOSPPT.2019122-2020131[1].pptx
 
Unit 4 part 1
Unit 4 part 1Unit 4 part 1
Unit 4 part 1
 
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
An Efficient Distributed Control Law for Load Balancing in Content Delivery N...
 
A New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia ApplicationsA New QoS Renegotiation Mechanism for Multimedia Applications
A New QoS Renegotiation Mechanism for Multimedia Applications
 
unit3.ppt
unit3.pptunit3.ppt
unit3.ppt
 
ERTOS UNIT6.ppt
ERTOS UNIT6.pptERTOS UNIT6.ppt
ERTOS UNIT6.ppt
 
IEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and AbstractIEEE Networking 2016 Title and Abstract
IEEE Networking 2016 Title and Abstract
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
Camp finall
Camp finallCamp finall
Camp finall
 
Centralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data ServicesCentralized Data Verification Scheme for Encrypted Cloud Data Services
Centralized Data Verification Scheme for Encrypted Cloud Data Services
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 

Último

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

Second review

  • 1. MAINTAIN CACHE CONSISTENCY IN MOBILE NETWORKS BASED ON DCIM GUIDE NAME: Mrs.R.Prathiba (Ass Prof/ECE Dept) BATCH MEMBERS: P.Praveenkumar-47210106041 M.Roshni-47210106048 M.Rakeshvar-47210106305
  • 2. ABSTRACT • Distributed Cache Invalidation Method is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching. • Expired TTL values are grouped in validation requests to the data source to refresh them and unexpired ones but with high request rates are prefetched from the server. • This extend preliminary work to develop a replica node and provide security for all nodes in DCIM.
  • 3. INTRODUCTION • • • • • • • • MANET-Mobile Ad Hoc Networks Formed by wireless hosts which may be mobile No pre-existing infrastructure Routes between nodes may potentially contain multiple hops Nodes act as routers to forward packets for each other Node mobility may cause the routes change In MANET environments, data caching is essential because it increases the ability of mobile devices to access desire data. In this paper, we propose a pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees.
  • 5. DCIM DESIGN & FUNCTION • • • TTL as a factor multiplied by the time difference between the query time of the item and its last update time. This factor determines how much the algorithm is optimistic or conservative. The cache piggybacks a list of invalidated documents when communicating with the server, while in the server piggybacks a list of updated documents when it communicates with the cache. Since pre-fetching data items to save on query delay constitutes most of the traffic consumption in the network, pre-fetching only highly requested items helps to limit the bandwidth consumption in the network.
  • 6. IMPLEMENTATION OF PULL BASED ALGORITHM • • • A pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees. Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source. Expired items as well as non expired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed, or invalidates them, based on their request rates. It makes use of piggybacking and prefetching to increase the accuracy of its estimation to reduce both traffic and query delays. We compared this approach to two pull-based approaches (fixed TTL and client polling) and to two serverbased approaches .
  • 7. CLIENT-SERVER UPDATION • • • The client polling systems, such as those presented in, a cache validation request is initiated according to a schedule determined by the cache. There the system is configured with a probability that controls the validation of the data item from the server or the neighbors when requested. Although client poll algorithms have relatively low bandwidth consumption, their access delay is high considering that each item needs to be validated upon each request.
  • 8. LITERATURE SURVEY Existing System Proposed System The cache consistency mechanisms in the literature can be grouped into three main categories: push based, pull based, and hybrid approaches A pull-based algorithm that implements adaptive TTL, piggybacking, and prefetching, and provides near strong consistency guarantees. Push-based mechanisms are mostly serverbased, where the server informs the caches about updates, whereas Pull-based approaches are client-based, where the client asks the server to update or validate its cached data. Expired items as well as nonexpired ones but meet certain criteria are grouped in validation requests to the data source, which in turn sends the cache devices the actual items that have changed, or invalidates them, based on their request rates. This approach, which we call distributed cache invalidation mechanism (DCIM). Finally, in hybrid mechanisms the server pushes the updates or the clients pull them This extend preliminary work to develop a replica node and provide security for all nodes in DCIM.
  • 9. DISADVANTAGES OF EXISTING SYSTEM • • • The major issue that faces client cache management concerns the maintenance of data consistency between the cache client and the data source. Requires costly communications with the server to validate (renew) cached items, considering the resource limited mobile devices and the wireless environments they operate in. Packet losses and traffic is high in server based consistency.
  • 10. ADVANTAGES OF PROPOSED SYSTEM • • TTL algorithms are popular due to their simplicity, sufficiently good performance, and flexibility to assign TTL values to individual data items. Limited device energy and network bandwidth and then achieving superior availability, delay, and traffic performance.
  • 11. REFERENCES • Kassem Fawaz, Student Member, IEEE, and Hassan Artail, Senior Member, IEEE”Distributed Cache Invalidation Method For Maintaining Cache Consistency in WMN,”Computer, vol. 12,no. 4, April 2013. • H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman,“COACS: A Cooperative and Adaptive Caching System forMANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961-977, Aug.2008 • W. Zhang and G. Cao, “Defending Against Cache Consistency Attacks in Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 6, pp. 363-379, 2008. • Y. Fang, Z. Haas, B. Liang, and Y.B. Lin, “TTL Prediction Schemes and the Effects of Inter-Update Time Distribution on Wireless Data Access,” Wireless Networks, vol. 10, pp. 607-619, 2004. • K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec. 2012.