CFP last date
20 January 2025
Reseach Article

Invalidation Method for Wireless Mobile Network to Maintain Consistency

by Asmita R. Shelke, B.M. Patil
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 142 - Number 1
Year of Publication: 2016
Authors: Asmita R. Shelke, B.M. Patil
10.5120/ijca2016909663

Asmita R. Shelke, B.M. Patil . Invalidation Method for Wireless Mobile Network to Maintain Consistency. International Journal of Computer Applications. 142, 1 ( May 2016), 27-31. DOI=10.5120/ijca2016909663

@article{ 10.5120/ijca2016909663,
author = { Asmita R. Shelke, B.M. Patil },
title = { Invalidation Method for Wireless Mobile Network to Maintain Consistency },
journal = { International Journal of Computer Applications },
issue_date = { May 2016 },
volume = { 142 },
number = { 1 },
month = { May },
year = { 2016 },
issn = { 0975-8887 },
pages = { 27-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume142/number1/24862-2016909663/ },
doi = { 10.5120/ijca2016909663 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:43:47.389905+05:30
%A Asmita R. Shelke
%A B.M. Patil
%T Invalidation Method for Wireless Mobile Network to Maintain Consistency
%J International Journal of Computer Applications
%@ 0975-8887
%V 142
%N 1
%P 27-31
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is proposed for the distributed cache invalidation mechanism (DCIM), it is a client-based cache consistency scheme which is implemented on the top of a previously proposed architecture for the caching data items in mobile ad hoc networks (MANETs), namely COACS, where special nodes cache the queries and the addresses of the nodes that store the responses to these queries. Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. The classical cache invalidation strategies are not suitable for the mobile environments due to frequent disconnections and mobility of the clients. The huge amount of demand has been created due to trend toward wireless communications and advances in mobile technologies are which increasing the consumer demands for ubiquitous access to Internet-based information and services. DCIM can be implemented using ns2, and compared against the client-based and server-based schemes to assess its performance experimentally. Hear introduce DCIM that is totally client-based. DCIM is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and pre-fetching, and provides near strong consistency capabilities.

References
  1. L. Bright, A. Gal, and L. Raschid, “Adaptive Pull-Based Policies for Wide Area Data Delivery,” ACM Trans. Database Systems, vol. 31, no. 2, pp. 631-671, 2006.
  2. C.P. Danzig, C. Neerdaels, M. Schwartz, and K. Worrell, “A Hierarchical Internet Object Cache,” Proc. Ann. Conf. USENIX Ann. Technical Conf., p. 13, 1996.
  3. V. Jacobson, “Congestion Avoidance and Control,” Proc. ACM SIGCOMM Computer Comm. Rev., vol. 25, p. 187, 1995.
  4. X. Chen and P. Mohapatra, “Lifetime Behavior and its Impact on Web Caching,” Proc. IEEE Workshop Internet Applications, pp. 5461, 1999.
  5. Y. Sit, F. Lau, and C-L. Wang, “On the Cooperation of Web Clients and Proxy Caches,” Proc. 11th Int’l Conf. Parallel and Distributed Systems, pp. 264- 270, July 2005.
  6. P.Papadimitratos and Z. Haas, “Secure Data Transmission in Mobile Ad Hoc Networks,” Proc. ACM Workshop Wireless Security, pp. 41-50, 2003.
  7. W. Zhang and G. Cao, “Defending Against Cache Consistency Attacks in Wireless Ad Hoc Networks,” Ad Hoc Networks, vol. 6, pp. 363-379, 2008.
  8. H. Maalouf and M. Gurcan, “Minimisation of the Update Response Time in a Distributed Database System,” Performance Evaluation, vol. 50, no. 4, pp. 245-66, 2002.
  9. T. Hara and S. Madria, “Dynamic Data Replication using Aperiodic Updates in Mobile Ad Hoc Networks,” Proc. Database Systems for Advanced Applications, pp. 111-136, 2004.
  10. K. Fawaz and H. Artail, “A Two-Layer Cache Replication Scheme for Dense Mobile Ad Hoc Networks,” Proc. IEEE Global Comm. Conf. (GlobeCom), Dec. 2012
Index Terms

Computer Science
Information Sciences

Keywords

MANET data caching pull-based TTL shared data.