Skip to main content
Log in

Applying FLC-based dynamic buffer size tuning to shorten the information retrieval round trip time in mobile location-aware environments

  • Original Article
  • Published:
Personal and Ubiquitous Computing Aims and scope Submit manuscript

Abstract

This paper proposes to use the novel fuzzy logic controller (FLC), which is a dynamic buffer size tuning technique, to support more dependable location-aware information retrieval in a pervasive environment. Within a smart space of a mobile/pervasive environment a user may request service from the dedicated surrogate via a portable small-form-factor (SFF) device (e.g. PDA). In effect, the SFF is the client and the surrogate is the server, which may serve many clients at the same time. The one-surrogate-to-many-SFF relationship or asymmetric rendezvous easily makes the surrogate buffer overflow in the peak demand seasons. The request traffic to the surrogate is tied in with the transient traveler mass traffic through the smart space, for example, in an airport. The transit travelers may switch on their mobile SFF at will to demand service from the local surrogate. If the surrogate buffer overflows, the users do not benefit from the cyber foraging provided by the pervasive computing infrastructure in the background. The FLC adaptively tunes the surrogate buffer size so that it always covers the queue length by the given Δ safety margin. As a result the SFF-surrogate asymmetric rendezvous becomes dependable because the chance of buffer overflow is eliminated. The dependability leads to shorter information retrieval roundtrip time (RTT) and happier users.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  1. Garlan D, Siewiorek DP, Smailagic A, Steenkiste P (2002) Project aura: toward distraction-free pervasive computing. IEEE Pervasive Comput 1(2):22–31

    Article  Google Scholar 

  2. Weiser M (1991) The computer for the twenty-first century, Scientific American, pp 94–104

  3. Hightower J, Borriello G (2001) Location systems for ubiquitous computing. IEEE Comput 34(8):57–66

    Google Scholar 

  4. Cool C, Spink A (2002) Issues of context in information retrieval (IR): an introduction to the special issue. Inf Process Manage 38(5):605–611

    Article  Google Scholar 

  5. Brown PJ, Jones GJF (2001) Context-aware retrieval: exploring a new environment for information retrieval and information filtering. Pers Ubiquit Comput 5(4):253–263

    Article  Google Scholar 

  6. Brown PJ, Jones GJF (2002) Information access and retrieval: exploiting contextual change in context-aware retrieval. In: Proceedings of the 2002 ACM symposium on applied computing, Madrid, pp 650 – 656

  7. Satyanarayanan M (2001) Pervasive computing: vision and challenges. IEEE Pers Commun 8(4):10–17

    Article  Google Scholar 

  8. Patterson CA, Muntz RR, Pancake CM (2003) Challenges in location-aware computing. IEEE Pervasive Comput 2(2):80 – 89

    Article  Google Scholar 

  9. Lewis T (1996) The next 10,0002 years: part 1. IEEE Comput 29(4):64–70

    Google Scholar 

  10. Malla A, El-Kadi M, Olariu S, Todorova P (2003) A fair resource allocation protocol for multimedia wireless networks. IEEE Trans Parallel Distrib Syst 14(1):63–71

    Article  Google Scholar 

  11. Jamjoom H, Pillai P, Shin KG (2004) Resynchronization and controllability of bursty service requests. IEEE/ACM Trans Netw 14(4):582–594

    Article  Google Scholar 

  12. Medina A, Matta I, Byers J (2000) On the origin of power laws in internet topologies. ACM SIGCOMM 30(2):18–28

    Article  Google Scholar 

  13. Molnar S, Dang TD, Vidacs A (1999) Heavy-tailedness, long-range dependence and self-similarity in data traffic. In: Proceedings of 7th international conference on telecommunication systems, Modelling and analysis, Nashville, pp 18–21

  14. Lin WWK, Wong AKY (2002) A fuzzy controller for adaptive buffer control leading to better channel reliability and system performance for object-based internet applications. In: Proceedings of the PDPTA2002, Las Vegas, pp 345–350

  15. Wong AKY, Dillon TS, Lin WWK, Ip MTW (2001) M 2 RT: a tool developed for predicting the mean message response time for internet channels. J Comput Netw 36:557–577

    Article  Google Scholar 

  16. Wong AKY, Wong JHC (2001) A convergence algorithm for enhancing the performance of distributed applications running on sizeable networks, the international journal of computer systems. Sci Eng 16(4):229–236

    Google Scholar 

  17. Wong AKY, Ip MTW, Dillon TS (2002) M3RT: An internet end-to-end performance measurement approach for real-time applications with mobile agents. In: Proceedings of the ISPAN’2002, pp 119–124

  18. Avizienis A, Laprie JC, Randell B, Landwehr C (2004) Basic concepts and taxonomy of dependable and secure computing. IEEE Trans Depend Secure Comput 1(1):11–33

    Article  Google Scholar 

  19. [VTune] Intel’s VTune performance analyzer, http://www.intel.com/support/performancetools/vtune/v5

  20. Karagiannis T, Faloutsos M, Molle M (2003) A user-friendly self-similarity analysis tool. ACM SIGCOMM Comput Commun Rev 33(3):81–93 (http://www.cs.ucr.edu/∼tkarag/Selfis/Selfis.html)

  21. The wireless LAN traces, Department of Computing, Hong Kong Polytechnic University, http://www4.comp.polyu.edu.hk/∼cswklin/research/traces/wireless/

  22. Tang D, Baker M Analysis of a local-area wireless network. In: Proceedings of the 6th annual international conference on mobile computing and networking, Boston, pp 1–10 http://mosquitonet.stanford.edu/software.html

Download references

Acknowledgments

The authors thank the Hong Kong Polytechnic University for the grants, A-PF75 and H-ZJ91.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wilfred W. K. Lin.

Appendix: The essence of the convergence algorithm

Appendix: The essence of the convergence algorithm

The convergence algorithm (CA) is an internet end-to-end performance measurement (IEPM) technique. It estimates the mean service roundtrip time (RTT) of a logical channel quickly and accurately. The Java-based CA prototype, M 2 RT, was verified and validated as a macro tool. In its macro form the tool must be installed at the two nodes that represent the ends of the logical channel. Micro IEPM tools differ by operating as a logical entity to be invoked anytime and anywhere for service by message passing. The positive mean message response time (M 2 RT) experience led to the development of the Java-based micro CA (MCA) prototype: micro mean message response time (M 3RT) [17]. The CA treats a traffic pattern simply as a waveform, and its speed and accuracy are independent of the traffic pattern because it is based on the Central Limit Theorem. The CA operation is summarized by (2) and (3), where M i is the estimated mean of the distribution for the time window in which the F (flush limit) number of data samples is collected; F = 14 yields the fastest estimation convergence. The other parameters are: (a) M i − 1 is the feedback of the last estimated mean to the current estimation cycle, (b) m i j is the jth sample in the jth M i estimation cycle, j =  1,2,3,(F − 1), and (c) M 0 is the first data sample when the CA has started. Figure 16 is an example in which M i always settles to the average channel RTT of 480 ms in the steady state.

$$ M_{i} = \frac{{M_{{i - 1}} + {\sum_{j = 1}^{j = F - 1} {m^{i}_{j} } }}}{F}; $$
(5)
$$ M_{0} = m^{{i = 1}}_{{j = 0}};\quad i \geq 1 $$
(6)
Fig. 16
figure 16

An example M i of prediction for a TCP channel

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lin, W.W.K., Dillon, T.S. & Wong, A.K.Y. Applying FLC-based dynamic buffer size tuning to shorten the information retrieval round trip time in mobile location-aware environments. Pers Ubiquit Comput 12, 45–55 (2008). https://doi.org/10.1007/s00779-006-0125-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00779-006-0125-0

Keywords