Client Based Cache Consistency Scheme in Wireless Mobile Networks
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: This paper proposes a client based cache consistency scheme for maintaining cache consistency in wireless mobile networks using a distributed cache invalidation method. This is implemented on top of a previously proposed architecture for caching data items in mobile ad hoc networks (MANETs), namely COCAS. We have also previously proposed a client and server based consistency scheme, named SSUM and DCIM. Client based cache consistency scheme is a pull-based algorithm that implements adaptive time to live (TTL), piggybacking, and prefetching, and provides strong consistency capabilities. We assign an adaptive TTL value to the cached data items in the data source depending on their update rates, where items with expired TTL values are grouped in validation requests to the data source to refresh them. But the unexpired ones with high request rates are prefetched from the server.
Authors and Affiliations
Aswathi. P , Abey Abraham
Digital Image Forgery Detection by Contrast Enhancement
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...
Using Daub achy Wavelet for Shot Boundary Detection
Abstract: SHOT Boundary Detection Is A Fundamental Step In Most Video Processing And Manipulation Applications. With The Wide Spread Of Video Usage Nowadays, The Rise For Automated Video Shot Boundary Detection Bec...
Real-Time Link-Reliability Routing for QoS in Wireless Sensor Networks
This paper proposes a Real-Time Link Reliability Routing protocol for wireless sensor networks (WSNs). The protocol achieves to reduce packet deadline miss ratio while considering link reliability, two-hop veloci...
Performance Comparison of Transport Layer Protocols for Multimedia Application in Wired Networks
Abstract: In this paper, we present to discuss the performance of transport layer protocols for multimedia application in the wired network. More precisely, TCP and UDP Performance are evaluated then compared. Two scenar...
Evolution of Sha-176 Algorithm
To maintain data integrity hash functions are generally used. Hash function is one type of cryptographic primitives, which provide an assurance for data integrity. NAS has designed SHA hash functions which are th...