Skip to main content
Log in

Performance improvement of distributed cache using middleware session

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

This paper proposes a novel approach to routing architecture based on the Session–Cookie protocol. The proposed architecture performs service discovery by integrating IoTs geographic clustering technique and polymorphism mechanism. Prioritizing requests is done in cookies and the load balancing on sessions. The efficiency of the proxy server’s distributed cache and service discovery is improved. Smart devices, vehicles, and people inaugurate a p2p connection to receive the service, exchange data, and share files in applications such as parking systems, navigation, and vehicle insurance companies. According to the results, the average response time and the bandwidth consumption have decreased, and the cache hit rate has reached 86%. Based on the principles of game theory, the proposed architecture in the extensive game model with imperfect information in the conditions ((mtcp, mudp), (Y, Y); λ = 1, µ = 0)) has a weak sequential equilibrium and Nash equilibrium.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Algorithm 6
Algorithm 7
Algorithm 8
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

Availability of data and materials

The data and files of the NS2 network simulator software and the codes written in C++ programming language can be sent through the following email addresses: Jafari@phd.iaurasht.ac.ir or Jafari_Bita@yahoo.com.

References

  1. Ketu SH, Mishra PK (2022) Cloud fog and mist computing in IoT. An indication of emerging opportunities. IETE Tech Rev 39(3):713–724. https://doi.org/10.1080/02564602.2021.1898482

    Article  Google Scholar 

  2. Lu Q, Wang H, Guo J, Yang W, Lv J (2021) On-path caching based on content relevance in information-centric networking. Comput Commun 176(10):272–281. https://doi.org/10.1016/j.comcom.2021.06.015

    Article  Google Scholar 

  3. Joshi T, Goyal N, Ram M (2022) An approach to analyze reliability indices in peer-to-peer communication systems. Cybern Syst 53(8):716–733. https://doi.org/10.1080/01969722.2022.2047273

    Article  Google Scholar 

  4. He H, Cui L, Zhou F, Wang D (2017) Distributed proxy cache technology based on autonomic computing in smart cities. Fut Gener Comput Syst 76:370–383. https://doi.org/10.1016/j.future.2016.03.015

    Article  Google Scholar 

  5. Renuka BS, Prafulla Shashikiran GT (2020) Model of load distribution between web proxy servers using network traffic analysis. SN Comput Sci 1(2):1–8. https://doi.org/10.1007/s42979-020-0108-7

    Article  Google Scholar 

  6. Vitor G, Rito P, Sargento S, Pinto F (2022) A scalable approach for smart city data platform: Support of real-time processing and data sharing. Comput Net 213(12):109027. https://doi.org/10.1016/j.comnet.2022.109027

    Article  Google Scholar 

  7. Kalantary S, Akbari Torkestani J, Shahidinejad A (2021) Resource discovery in the internet of things integrated with fog computing using Markov learning model. J Supercomp 77(12):13806–13827

    Article  Google Scholar 

  8. Jazaeri SS, Asghari PA, Jabbehdari SA (2023) Javadi HHS (2023) Composition of caching and classifcation in edge computing based on quality optimization for SDN-based IoT healthcare solutions. Supercomputing 79:17619–17669

    Article  Google Scholar 

  9. Mangla T, Halepovic E, Ammar M, Zegura E (2019) Using session modeling to estimate HTTP-based video QoE metrics from encrypted network traffic. IEEE Trans Netw Serv Manag 16(3):1086–1099

    Article  Google Scholar 

  10. Liupengfei Wu, Weisheng Lu, Chen C (2023) Strengths and weaknesses of client- server and peer-to-peer network models in construction projects. Int J Constr Manag. https://doi.org/10.1080/15623599.2023.2185950

    Article  Google Scholar 

  11. Tanganelli G, Vallati C, Mingozzi E (2017) Edge-centric distributed discovery and access in the internet of things. IEEE Internet Things J 5(1):425–438

    Article  Google Scholar 

  12. Woungang I, Tseng F, Lin Y, Chou L, Chao H, Obaidat MS (2015) Mr-chord: Improved chord lookup performance in structured mobile p2p networks. IEEE Syst J 9(3):743–751. https://doi.org/10.1109/JSYST.2014.2306147

    Article  Google Scholar 

  13. Thanikaivel B, Venkatalakshmi K, Kannan A (2021) Optimized mobile cloud resource discovery architecture based on dynamic cognitive and intelligent technique. Microproc Microsyst 81:103716

    Article  Google Scholar 

  14. Jamil B, Ijaz H, Shojafar M, Munir K (2023) IRATS: a DRL-based intelligent priority and deadline-aware online resource allocation and task scheduling algorithm in a vehicular fog network. Ad Hoc Netw 141:10309. https://doi.org/10.1016/j.adhoc.2023.103090

    Article  Google Scholar 

  15. Osamy W, Khedr AM, Salim A (2019) ADSDA: adaptive distributed service discovery algorithm for internet of things based mobile wireless sensor networks. IEEE Sens J 19(22):10869–10880

    Article  Google Scholar 

  16. Ameur AI, Lakas A, Bachir YM, Oubbati OS (2022) Peer-to-peer overlay techniques for vehicular ad hoc networks: survey and challenges. Veh Commun 34:100455. https://doi.org/10.1016/j.vehcom.2022.100455

    Article  Google Scholar 

  17. Li Ch, Liu J, Zhang Q, Luo Y (2021) Efficient cooperative cache management for latency-aware data intelligent processing in edge environment. Fut Gener Comput Syst 123(10):48–67

    Article  Google Scholar 

  18. Tang Y, Guo K, Ma J, Shen Y, Chi T (2019) A smart caching mechanism for mobile multimedia in information centric networking with edge computing. Fut Gener Comput Syst 91(2):590–600. https://doi.org/10.1016/j.future.2018.08.019

    Article  Google Scholar 

  19. Xiang M, Jiang Y, Xia Z, Huang C (2020) Consistent hashing with bounded loads and virtual nodes-based load balancing strategy for proxy cache cluster. Cluster Comput 23(4):3139–3155. https://doi.org/10.1007/s10586-020-03076-4

    Article  Google Scholar 

  20. Ali AM, Bagchi S (2018) Hybrid architecture for autonomous load balancing in distributed systems based on smooth fuzzy function. Intell Autom Soft Comput Doi 10(31209/2018):100000043

    Google Scholar 

  21. Nath S, Paul A, Banerjee R, Bhaumik S, Sing JK, Kumar Sarkar S (2020) Optimizing fanet routing using a hybrid approach of firefly algorithm and aco-l'evy flight. In: The 2020 IEEE Vlsi device circuit and system (VLSI DCS), pp 378–383. https://doi.org/10.1109/VLSIDCS47293.2020.9179956

  22. Gupta AN, Barthwal AN, Vardhan HA, Kakria SH, Kumar SU, Parihal AS, Chopra R (2023) Evolutionary study of distributed authentication protocols and its integration to UAV-assisted FANET. Multimed Tools Appl. https://doi.org/10.1007/s11042-023-15197-0

    Article  Google Scholar 

  23. Yu K, Lin L, Alazab M, Tan L, Gu B (2021) Deep learning-based traffic safety solution for a mixture of autonomous and manual vehicles in a 5g-enabled intelligent transportation system. IEEE Trans Intell Transp Syst 22(7):4337–4347. https://doi.org/10.1109/TITS.2020.3042504

    Article  Google Scholar 

  24. Jeong J, Shen Y, Oh T, C’espedes S, Benamar N, Wetterwald M, H¨arri J, (2021) A comprehensive survey on vehicular networks for smart roads: A focus on ip-based approaches. Veh Commun 29:100334. https://doi.org/10.1016/j.vehcom.2021.100334

    Article  Google Scholar 

  25. Hussain R, Lee J, Zeadally S (2021) Trust in vanet: A survey of current solutions and future research opportunities. IEEE Trans Intell Transp Syst 22(5):2553–2571. https://doi.org/10.1109/TITS.2020.2973715

    Article  Google Scholar 

  26. Srivastava A, Prakash A, Tripathi R (2020) Location based routing protocols in vanet: Issues and existing solutions. Veh Commun 23:100231. https://doi.org/10.1016/j.vehcom.2020.100231

    Article  Google Scholar 

  27. Hussain R, Hussain F, Zeadally S (2019) Integration of vanet and 5g security: A review of design and implementation issues. Future Gener Comput Syst 101:843–864. https://doi.org/10.1016/j.future.2019.07.006

    Article  Google Scholar 

  28. Jahangeer N, Aldabbas PBH (2021) A study on modeling vehicles mobility with mlc for enhancing vehicle-to-vehicle connectivity in vanet. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02559-x

    Article  Google Scholar 

  29. Wang S, Lu S, Zhang Q (2019) Instantly decodable network coding–assisted data dissemination for prioritized services in vehicular ad hoc networks. Int J Distrib Sens Netw 15(4):1550147719842137. https://doi.org/10.1177/1550147719842137

    Article  Google Scholar 

  30. Jeong MW, Ryu JY, Kim S, Lee W, Ban TW (2020) A completely distributed transmission algorithm for mobile device-to-device caching networks. Comput Electr Eng 87(7):106803. https://doi.org/10.1016/j.compeleceng.2020.106803

    Article  Google Scholar 

  31. Guo N, Zhao C, Gao T (2020) An anonymous authentication scheme for edge computing-based car–home connectivity services in vehicular networks. Future Gener Comput Syst 106(5):659–671. https://doi.org/10.1016/j.future.2020.01.028

    Article  Google Scholar 

  32. Barberis C, Malnati G (2011) Design and evaluation of a collaborative system for content diffusion and retrieval in vehicular networks. IEEE Trans Consum Electron 57(1):105–112. https://doi.org/10.1109/TCE.2011.5735489

    Article  Google Scholar 

  33. Guezzi A, Lakas A, Korichi A, Cherbal S (2020) Peer to peer approach based replica and locality awareness to manage and disseminate data in vehicular ad hoc networks. Int J Comput Netw Commun 12:65–81. https://doi.org/10.5121/ijcnc.2020.12605

    Article  Google Scholar 

  34. Haq A, Faheem Y (2020) A peer-to-peer communication based content distribution protocol for incentiveaware delay tolerant networks. Wirel Netw. https://doi.org/10.1007/s11276-019-02167-4

    Article  Google Scholar 

  35. Ilyas A, Alatawi MN, Hamid Y, Mahfooz S, Zada I, Gohar N (2022) Shah MA (2022) Software architecture for pervasive critical health monitoring system using fog computing. J Cloud Comp 11:84. https://doi.org/10.1186/s13677-022-00371-w

    Article  Google Scholar 

  36. You Z, Cheng G, Wang Y, Chen P, Chen S (2019) Cross-layer and sdn based routing scheme for p2p communication in vehicular ad-hoc networks. Appl Sci. https://doi.org/10.3390/app9224734

    Article  Google Scholar 

  37. Alden FZ, Hassan S, Habbal A, Wei X (2022) An adaptive social-aware device-to-device communication mechanism for wireless networks. Ad Hoc Netw 137(14):102955. https://doi.org/10.1016/j.adhoc.2022.102955

    Article  Google Scholar 

  38. Yuan P, Shao S, Geng L, Zhao X (2021) Caching hit ratio maximization in mobile edge computing with node cooperation. Comput Netw 200(17):108507. https://doi.org/10.1016/j.comnet.2021.108507

    Article  Google Scholar 

  39. Gibbons R (1992) Games in extensive form. In: A Primer in Game Theory. Harvester Wheatheaf of press, Harlow

  40. Javadpour A, Pinto P, Ja’fari F, Zhang W (2023) A distributed multi-agent intrusion detection and prevention system for cloud IoT environments. Cluster Comput 26(4):367–384. https://doi.org/10.1007/s10586-022-03621-3

    Article  Google Scholar 

Download references

Acknowledgements

This manuscript is prepared based on the Ph.D. thesis of the first author at Rasht Branch, Islamic Azad University, Rasht, Iran.

Funding

No funding was received for conducting this study.

Author information

Authors and Affiliations

Authors

Contributions

BJ was involved in conceptualization; data curation; formal analysis; investigation; methodology; resources; software; validation; visualization; roles/writing—original draft; and writing—review and editing. PB was involved in conceptualization; data curation; formal analysis; funding acquisition; investigation; methodology; project administration; resources; supervision; validation; visualization; draft; and writing—review and editing.

Corresponding author

Correspondence to Peyman Bayat.

Ethics declarations

Conflict of interest

The authors declare they have no conflicts of interest to report regarding the present study.

Ethical approval

This study is only based on theoretical basic research. It is not involving humans.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Each line represents a simulated action, and the numbers indicate the arbitrary time it takes for that action to complete. The actual results and timing will depend on the specifics of our implementation, the environment in which it is running, and the efficiency of the operations being performed.

figure m

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Jafari, B., Bayat, P. Performance improvement of distributed cache using middleware session. J Supercomput 80, 10818–10862 (2024). https://doi.org/10.1007/s11227-023-05823-x

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05823-x

Keywords