Your SlideShare is downloading. ×
  • Like
DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks

  • 1,174 views
Published

DCIM: Distributed Cache Invalidation …

DCIM: Distributed Cache Invalidation
Method for Maintaining Cache Consistency
in Wireless Mobile Networks

Partial Doc , For more project contact : Ambitlick@gmail.com , PH : 8940956123

Published in Education , Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
1,174
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
36
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. DCIM: DISTRIBUTED CACHE INVALIDATION METHOD FOR MAINTAINING CACHE CONSISTENCY IN WIRELESS MOBILE NETWORKS
  • 2. ABSTRACT:  In mobile ad hoc networks (MANETs) DCIM that is totally client-based.  DCIM is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and pre-fetching, and provides near strong consistency capabilities.  Cached data items are assigned adaptive TTL values that correspond to their update rates at the data source, where items with expired TTL values are grouped in validation requests to the data source to refresh them, whereas unexpired ones but with high request rates are pre-fetched from the server.  DCIM is analyzed to assess the delay and bandwidth gains (or costs) when compared to polling every time and push-based schemes.
  • 3. EXISTING SYSTEM : 1. Distributed cache invalidation mechanism 2. COACS Architecture 3. Push-based mechanisms 4. Pull-based approaches
  • 4. PROPOSED SYSTEM :  Hybrid mechanisms (Client – server Authentication)  MD5 Algorithm  Time to live (TTL)  A data which stores in cache will be expired if it has not used within threshold time since last update  Simplicity, good performance, flexibility to assign TTL values
  • 5. OVERALL BLOCK DIAGRAM : ServerQD (query directories) Caching nodes Network Failure Request Response 1. Cache Consistency Algorithm 2. Time to live 3. Bit sequence Algorithm Invalidation Server Bandwidth Utilization Cache Delay Average Time MD5 – Algorithm
  • 6. MODULES 1. Design of caching architecture 2. Parameter functions of COACS in MANETs 3. Client- Server Update Mechanism 4. Implementation of MD5 algorithm 5. Performance Analysis  Query delay  Overhead traffic
  • 7. REFERENCES [1] T. Andrel and A. Yasinsac, “On Credibility of MANET Simulations,” IEEE Computer, vol. 39, no. 7, pp. 48-54, July 2006. [2] H. Artail, H. Safa, K. Mershad, Z. Abou-Atme, and N. Sulieman, “COACS: A Cooperative and Adaptive Caching System for MANETS,” IEEE Trans. Mobile Computing, vol. 7, no. 8, pp. 961- 977, Aug. 2008. [3] D. Barbara and T. Imielinski, “Sleepers and Workaholics: Caching Strategies for Mobile Environments,” Proc. ACM SIGMOD, pp. 1- 12, May 1994. [4] G. Cao, “A Scalable Low-Latency Cache Invalidation Strategy for Mobile Environments,” IEEE Trans. Knowledge and Data Eng.,vol. 15, no. 5, pp. 1251-1265, Sept./Oct. 2003. [5] D. Li, P. Cao, and M. Dahlin, “WCIP: Web Cache Invalidation Protocol,” IETF Internet draft, http://tools.ietf.org/html/draft- danli-wrec-wcip-01 , Mar. 2001.