Skip to main content
Log in

A strongly consistent cached data access algorithm for wireless data networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

In wireless data networks such as the WAP system, the cached data may be time-sensitive and thus strong consistency must be maintained, i.e., the data presented to the user at the WAP handset must be the same as that in the origin server. In this paper, a strongly consistent cached data access algorithm, Probability-Based Callback (pCB in short), is proposed for such networks. In the pCB, upon an update arrival, the action taken by the server is not deterministic; the server can either invalidate the cached data entry in the client or send the updated data entry to the client. The pCB scheme can make good tradeoff between communication cost and access delay, which is extremely difficult for most of the existing cache access schemes. Besides, the pCB scheme possesses excellent universal adaptability and thus can adapt to the inherent heterogeneity of wireless networks and applications. We analytically model the pCB scheme, and derive closed-form analytical formulae for the mean communication cost per data entry access and the mean access delay under a general assumption on distributions of the inter-update and inter-access times. It is demonstrated that the existing Push and Callback schemes are special cases of the pCB scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. WAP Forum. (2002). Wireless application protocol WAP 2.0 technical white paper, Technical report, WAP Forum.

  2. Rao, C.-H., Chang, D.-F., & Lin, Y.-B. (2001). iSMS: An integration platform for short message service and IP networks. IEEE Network, 15, 48–55.

    Google Scholar 

  3. Lin, Y.-B., Lai, W.-R., & Chen, J.-J. (2003). Effects of cache mechanism on wireless data access. IEEE Transactions on Wireless Communications, 12(6), 1240–1246.

    Google Scholar 

  4. Tanenbaum, A. S. (2002). Computer networks (4th ed.). PTR: Prentice Hall.

    Google Scholar 

  5. Chen, H., & Xiao, Y. (2006). Cache access and replacement for future wireless Internet. IEEE Communications Magazine, 113–123.

  6. WAP Forum. (2001). Wireless application protocol architecture specification, Technical report, WAP Forum.

  7. WAP Forum. (2001). WAP cache operation specification, Technical report, WAP Forum.

  8. Barbara, D., & Imielinksi, T. (1995). Sleepers and workaholics: Caching strategies for mobile environments. VLDB Journal, 4(4), 567–602.

    Google Scholar 

  9. Cai, J., & Tan, K.-L. (1999). Energy-efficient selective cache invalidation. Wireless Networks, 5(6), 489–502.

    Google Scholar 

  10. Cao, G. (2002). Proactive power-aware cache management for mobile computing systems. IEEE Transactions on Computers, 51(6), 608–621.

    Google Scholar 

  11. Cao, G. (2003). A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering, 15(5), 1251–1265.

    Google Scholar 

  12. Hu, Q.-L., & Lee, D.-L. (1998). Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing, 1(1), 39–48.

    Google Scholar 

  13. Jing, J., Elmagarmid, A. K., Helal, A., & Alonso, R. (1997). Bit-sequences: A new cache invalidation method in mobile environments. Mobile Network Applications, 2(2), 115–127.

    Google Scholar 

  14. Kahol, A., Khurana, S., Gupta, S. K. S., & Srimani, P. K. (2001). A strategy to manage cache consistency in a distributed mobile wireless environment. IEEE Transactions on Parallel and Distributed Systems, 12(7), 686–700.

    Google Scholar 

  15. Wang, Z., Das, S. K., Che, H., & Kumar, M. (2004). A scalable asynchronous cache consistency scheme (SACCS) for mobile environments. IEEE Transactions on Parallel and Distributed Systems, 15(11), 983–995.

    Google Scholar 

  16. Wang, Z., Kumar, M., Das, S. K., & Shen, H. (2006). Dynamic cache consistency schemes for wireless cellular networks. IEEE Transactions on Wireless Communications, 5(2), 366–376.

    Google Scholar 

  17. Chen, H., Xiao, Y., & Shen, X. (2006). Update-based cache access and replacement in wireless data access. IEEE Transactions on Mobile Computing, 5(12), 1734–1748.

    Google Scholar 

  18. Xiao, Y., & Chen, H. (2006). Optimal callback with two-level adaptation for wireless data access. IEEE Transactions on Mobile Computing, 15(8), 1087–1102.

    Google Scholar 

  19. Fang, Y., & Lin, Y.-B. (2005). Strongly consistent access algorithms for wireless data networks. Wireless Networks, 11(3), 243–254.

    Google Scholar 

  20. Howard, J., Kazar, M., Menees, S., Nichols, D., Satyanarayanan, M., Sidebotham, R., & West, M. (1988). Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1), 51–58.

    Google Scholar 

  21. Nelson, M., Welch, B., & Ousterhout, J. (1988). Caching in the sprite network file system. ACM Transactions on Computer Systems, 6(1), 134–154.

    Google Scholar 

  22. Yin, J., Alvisi, L., Dahlin, M., & Lin, C. (1999). Volume leases for consistency in large-scale systems. IEEE Transactions on Knowledge and Data Engineering, 11(4), 563–576.

    Google Scholar 

  23. Meyer, C. D. (2000). Matrix analysis and applied linear algebra (2nd ed.). Philadelphia: SIAM.

    MATH  Google Scholar 

  24. Xiao, Y. (2003). Optimal fractional movement-based scheme for PCS location management. IEEE Communications Letters, 7(2), 67–69.

    Google Scholar 

  25. Fang, Y. (2003). Thinning schemes for call admission control in wireless networks. IEEE Transactions on Computers, 52(5), 685–687.

    Google Scholar 

  26. Vora, A., Tari, Z., Bertok, P., & Lai, K. (2002). A mobile cache consistency protocol using shareable read/write time locks. Proceedings of the Ninth International Conference on Parallel and Distributed Systems, Taiwan, pp. 284–290.

  27. Zhai, H., Kwon, Y., & Fang, Y. (2004). Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wireless Communications and Mobile Computing, 4(8), 917–931.

    Google Scholar 

  28. Fang, Y. (2001). Hyper-Erlang distribution model and its application in wireless mobile networks. Wireless Networks, 7(3), 211–219.

    Google Scholar 

  29. Cox, D. R. (1967). Renewal theory (2nd ed.) London: Methuen & Co.

    MATH  Google Scholar 

  30. Alemeida, V., & Oliveira, A. (1996). On the fractal nature of WWW and its application to cache modeling. Technical report. Boston University.

  31. Bahat, O., & Makowski, A. M. (2005). Measuring consistency in TTL-based caches. Performance Evaluation, 61(1–4), 439–455.

    Google Scholar 

  32. Chlebus, E., & Ludwin, W. (1995). Is handoff traffic really Poissonian? Proceedings of IEEE ICUPC, Tokyo, pp. 348–353.

  33. Kleinrock, L. (1975). Queueing systems: Theory (Vol. 1). New York: Wiley.

    MATH  Google Scholar 

  34. Zhou, Z.-H., & Zheng, J.-F. (2000). Functions of complex variable and integral transform. Beijing: Higher Education Publishing House.

    Google Scholar 

  35. Fang, Y. (2005). Modeling and performance analysis for wireless mobile networks: A new analytical approach. IEEE/ACM Transactions on Networking, 13(5), 989–1002.

    Google Scholar 

  36. Fang, Y., & Chlamtac, I. (1999). Teletraffic analysis and mobility modeling for PCS networks. IEEE Transactions on Communications, 47(7), 1062–1072.

    Google Scholar 

  37. Fang, Y., Chlamtac, I., & Fei, H. (2000). Analytical results for optimal choice of location update interval for mobility database failure restoration in PCS networks. IEEE Transactions on Parallel and Distributed Systems, 11(6), 615–624.

    Google Scholar 

  38. Yang, S.-R., & Lin, Y.-B. (2003). Performance evaluation of location management in UMTS. IEEE Transactions on Vehicular Technology, 52(6), 1603–1615.

    Google Scholar 

  39. Li, W., Fang, Y., & Henry, R. R. (2002). Actual call connection time characterization for wireless mobile networks under a general channel allocation scheme. IEEE Transactions on Wireless Communications, 1(4), 682–691.

    Google Scholar 

  40. Tang, S., & Li, W. (2006). Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. Tele Communication Systems, 32(1), 71–91.

    Google Scholar 

Download references

Acknowledgments

Many thanks are due to the editor, Dr L. Liu, and the anonymous reviewers whose comments greatly improve the quality of this paper. This work was supported by the National Science Foundation of China (NSFC) under the grant No. 90604035, the “Two Base” Project, the 111 Project under the grant No. 111-2-14, and the National 863 high-tech R&D program of China under the grant No. 2005AA123950.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xian Wang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wang, X., Fan, P. A strongly consistent cached data access algorithm for wireless data networks. Wireless Netw 15, 1013–1028 (2009). https://doi.org/10.1007/s11276-008-0099-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-008-0099-0

Keywords

Navigation