Skip to main content
Log in

Sleepers and workaholics: Caching strategies in mobile environments (Extended version)

  • Special System-oriented Section: The Best of SIGMOD '94
  • Published:
The VLDB Journal Aims and scope Submit manuscript

Abstract

In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication channels. Palmtop-based units will often be disconnected for prolonged periods of time, due to battery power saving measures; palmtops also will frequently relocate between different cells, and will connect to different data servers at different times. Caching of frequently accessed data items will be an important technique that will reduce contention on the narrow-bandwidth, wireless channel. However, cache individualization strategies will be severely affected by the disconnection and mobility of the clients. The server may no longer know which clients are currently residing under its cell, and which of them are currently on. We propose a taxonomy of different cache invalidation strategies, and study the impact of clients' disconnection times on their performance. We study ways to improve further the efficiency of the invalidation techniques described. We also describe how our techniques can be implemented over different network environments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Alonso, R., Barbará, D. and Garcia-Molina, H. Data caching issues in an information retrieval system.ATM Transactions on Database Systems, 15:359–384, 1990.

    Google Scholar 

  • Barbará, D. and Lipton, R.J. A class of randomized strategies for low-cost comparison of file copies.IEEE Transactions on Parallel and Distributed Systems, 2(2):160–170, 1991.

    Google Scholar 

  • Bharghavan, V., Demers, A., Shenker, S., and Zhang, L. Macaw: A media access protocol for wireless LANs.Proceedings of the ACM SIGCOMM, London, 1994.

  • Burrows, M., Abadi, M., and Needham, R. A logic of authentication.ACM Transactions on Computer Systems, 8(1):18–36, 1990.

    Google Scholar 

  • Chernoff, H. A measure of asymptotic efficiency for tests of a hypotesis based on the sum of observations.Annals of Mathematical Statistics, 23:493–509, 1952.

    Google Scholar 

  • Fuchs, W.K., Wu, K., and Abraham, J. Low-cost comparison and diagnosis of large remotely located files.Proceedings of the Fifth Symposium on Reliability of Distributed Systems, 1986.

  • Imieliński, T. and Badrinath, B.R. Querying in highly mobile and distributed environments.Proceedings of the Eighteenth International Conference on Very Large Databases, Vancouver, B.C., 1992.

  • Imieliński, T., Badrinath, B.R., and Viswanathan, S. Data dissemination in wireless and mobile environments. Technical Report 59, WINLAB, Rutgers University, 1993.

  • Imieliński, T., Viswanathan, S., and Badrinath, B.R. Indexing on air.Proceedings of the ACM-SIGMOD International Conference on Management of Data, Minneapolis, MN, 1994.

  • Madej, T. An application of group testing to the file comparison problem.Proceedings of the International Conference on Distributed Computing Systems, 1989.

  • Mummert, L., Wing, J.M., and Satyanarayanan, M. Using belief to reason about cache coherence.Proceedings of the ACM Sigact-Sigops Symposium on the Principles of Distributed Computing, 1994.

  • Nanda, S., Goodman, D., and Timor, U. Performance of PRMA: A packet voice protocol for cellular systems.IEEE Transactions on Vehicular Technology, 40(3) 1991.

    Google Scholar 

  • Nitzberg, B. and Lo, V. Distributed shared memory: A survey of issues and algorithms.IEEE Computer, 24(8) 1991.

  • Rangarajan, S. and Fussell, D. Rectifying corrupted files in distributed file systems.Proceedings of the International Conference on Distributed Computing Systems, 1991.

  • Sandberg, R., Goldberg, D., Kleiman, S., Walsh, D., and Lyon, B. Design and implementation of the Sun network filesystem.Proceedings of the USENIX Summer Conference, 1985.

  • Satyanarayanan, M., Howard, J.H., Nichols, D.N., Sidebotham, R.N., Spector, A.Z., and West, M.J. The ITC distributed file system: Principles and design.Proceedings of the Tenth ACM Symposium on Operating Systems Principles, 1985.

  • Satyanarayanan, M., Kistler, J.J., Kumar, P., Okasaki, M., Siegel, E.H., and Steere, D.C. Coda: A highly available file system for a distributed workstation environment.IEEE Transactions on Computers, 39(4): 1990.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Barbará, D., Imieliński, T. Sleepers and workaholics: Caching strategies in mobile environments (Extended version). VLDB Journal 4, 567–602 (1995). https://doi.org/10.1007/BF01354876

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01354876

Key Words

Navigation