Abstract
In wireless data networks such as the WAP system, the cached data may be time-sensitive and thus strong consistency must be maintained, i.e., the data presented to the user at the WAP handset must be the same as that in the origin server. In this paper, a strongly consistent cached data access algorithm, Probability-Based Callback (pCB in short), is proposed for such networks. In the pCB, upon an update arrival, the action taken by the server is not deterministic; the server can either invalidate the cached data entry in the client or send the updated data entry to the client. The pCB scheme can make good tradeoff between communication cost and access delay, which is extremely difficult for most of the existing cache access schemes. Besides, the pCB scheme possesses excellent universal adaptability and thus can adapt to the inherent heterogeneity of wireless networks and applications. We analytically model the pCB scheme, and derive closed-form analytical formulae for the mean communication cost per data entry access and the mean access delay under a general assumption on distributions of the inter-update and inter-access times. It is demonstrated that the existing Push and Callback schemes are special cases of the pCB scheme.












Similar content being viewed by others
References
WAP Forum. (2002). Wireless application protocol WAP 2.0 technical white paper, Technical report, WAP Forum.
Rao, C.-H., Chang, D.-F., & Lin, Y.-B. (2001). iSMS: An integration platform for short message service and IP networks. IEEE Network, 15, 48–55.
Lin, Y.-B., Lai, W.-R., & Chen, J.-J. (2003). Effects of cache mechanism on wireless data access. IEEE Transactions on Wireless Communications, 12(6), 1240–1246.
Tanenbaum, A. S. (2002). Computer networks (4th ed.). PTR: Prentice Hall.
Chen, H., & Xiao, Y. (2006). Cache access and replacement for future wireless Internet. IEEE Communications Magazine, 113–123.
WAP Forum. (2001). Wireless application protocol architecture specification, Technical report, WAP Forum.
WAP Forum. (2001). WAP cache operation specification, Technical report, WAP Forum.
Barbara, D., & Imielinksi, T. (1995). Sleepers and workaholics: Caching strategies for mobile environments. VLDB Journal, 4(4), 567–602.
Cai, J., & Tan, K.-L. (1999). Energy-efficient selective cache invalidation. Wireless Networks, 5(6), 489–502.
Cao, G. (2002). Proactive power-aware cache management for mobile computing systems. IEEE Transactions on Computers, 51(6), 608–621.
Cao, G. (2003). A scalable low-latency cache invalidation strategy for mobile environments. IEEE Transactions on Knowledge and Data Engineering, 15(5), 1251–1265.
Hu, Q.-L., & Lee, D.-L. (1998). Cache algorithms based on adaptive invalidation reports for mobile environments. Cluster Computing, 1(1), 39–48.
Jing, J., Elmagarmid, A. K., Helal, A., & Alonso, R. (1997). Bit-sequences: A new cache invalidation method in mobile environments. Mobile Network Applications, 2(2), 115–127.
Kahol, A., Khurana, S., Gupta, S. K. S., & Srimani, P. K. (2001). A strategy to manage cache consistency in a distributed mobile wireless environment. IEEE Transactions on Parallel and Distributed Systems, 12(7), 686–700.
Wang, Z., Das, S. K., Che, H., & Kumar, M. (2004). A scalable asynchronous cache consistency scheme (SACCS) for mobile environments. IEEE Transactions on Parallel and Distributed Systems, 15(11), 983–995.
Wang, Z., Kumar, M., Das, S. K., & Shen, H. (2006). Dynamic cache consistency schemes for wireless cellular networks. IEEE Transactions on Wireless Communications, 5(2), 366–376.
Chen, H., Xiao, Y., & Shen, X. (2006). Update-based cache access and replacement in wireless data access. IEEE Transactions on Mobile Computing, 5(12), 1734–1748.
Xiao, Y., & Chen, H. (2006). Optimal callback with two-level adaptation for wireless data access. IEEE Transactions on Mobile Computing, 15(8), 1087–1102.
Fang, Y., & Lin, Y.-B. (2005). Strongly consistent access algorithms for wireless data networks. Wireless Networks, 11(3), 243–254.
Howard, J., Kazar, M., Menees, S., Nichols, D., Satyanarayanan, M., Sidebotham, R., & West, M. (1988). Scale and performance in a distributed file system. ACM Transactions on Computer Systems, 6(1), 51–58.
Nelson, M., Welch, B., & Ousterhout, J. (1988). Caching in the sprite network file system. ACM Transactions on Computer Systems, 6(1), 134–154.
Yin, J., Alvisi, L., Dahlin, M., & Lin, C. (1999). Volume leases for consistency in large-scale systems. IEEE Transactions on Knowledge and Data Engineering, 11(4), 563–576.
Meyer, C. D. (2000). Matrix analysis and applied linear algebra (2nd ed.). Philadelphia: SIAM.
Xiao, Y. (2003). Optimal fractional movement-based scheme for PCS location management. IEEE Communications Letters, 7(2), 67–69.
Fang, Y. (2003). Thinning schemes for call admission control in wireless networks. IEEE Transactions on Computers, 52(5), 685–687.
Vora, A., Tari, Z., Bertok, P., & Lai, K. (2002). A mobile cache consistency protocol using shareable read/write time locks. Proceedings of the Ninth International Conference on Parallel and Distributed Systems, Taiwan, pp. 284–290.
Zhai, H., Kwon, Y., & Fang, Y. (2004). Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wireless Communications and Mobile Computing, 4(8), 917–931.
Fang, Y. (2001). Hyper-Erlang distribution model and its application in wireless mobile networks. Wireless Networks, 7(3), 211–219.
Cox, D. R. (1967). Renewal theory (2nd ed.) London: Methuen & Co.
Alemeida, V., & Oliveira, A. (1996). On the fractal nature of WWW and its application to cache modeling. Technical report. Boston University.
Bahat, O., & Makowski, A. M. (2005). Measuring consistency in TTL-based caches. Performance Evaluation, 61(1–4), 439–455.
Chlebus, E., & Ludwin, W. (1995). Is handoff traffic really Poissonian? Proceedings of IEEE ICUPC, Tokyo, pp. 348–353.
Kleinrock, L. (1975). Queueing systems: Theory (Vol. 1). New York: Wiley.
Zhou, Z.-H., & Zheng, J.-F. (2000). Functions of complex variable and integral transform. Beijing: Higher Education Publishing House.
Fang, Y. (2005). Modeling and performance analysis for wireless mobile networks: A new analytical approach. IEEE/ACM Transactions on Networking, 13(5), 989–1002.
Fang, Y., & Chlamtac, I. (1999). Teletraffic analysis and mobility modeling for PCS networks. IEEE Transactions on Communications, 47(7), 1062–1072.
Fang, Y., Chlamtac, I., & Fei, H. (2000). Analytical results for optimal choice of location update interval for mobility database failure restoration in PCS networks. IEEE Transactions on Parallel and Distributed Systems, 11(6), 615–624.
Yang, S.-R., & Lin, Y.-B. (2003). Performance evaluation of location management in UMTS. IEEE Transactions on Vehicular Technology, 52(6), 1603–1615.
Li, W., Fang, Y., & Henry, R. R. (2002). Actual call connection time characterization for wireless mobile networks under a general channel allocation scheme. IEEE Transactions on Wireless Communications, 1(4), 682–691.
Tang, S., & Li, W. (2006). Modeling and analysis of hierarchical cellular networks with bidirectional overflow and take-back strategies under generally distributed cell residence times. Tele Communication Systems, 32(1), 71–91.
Acknowledgments
Many thanks are due to the editor, Dr L. Liu, and the anonymous reviewers whose comments greatly improve the quality of this paper. This work was supported by the National Science Foundation of China (NSFC) under the grant No. 90604035, the “Two Base” Project, the 111 Project under the grant No. 111-2-14, and the National 863 high-tech R&D program of China under the grant No. 2005AA123950.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wang, X., Fan, P. A strongly consistent cached data access algorithm for wireless data networks. Wireless Netw 15, 1013–1028 (2009). https://doi.org/10.1007/s11276-008-0099-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-008-0099-0