About Me Joshua Silver  4th year CS major – graduating in May  Specialization: Databases  Interests:  The business side of computing … and no, not.

Slides:



Advertisements
Similar presentations
A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
Advertisements

Your All in 1 Logistics Solution. The Problem Problems that your business might be facing Delivery delay / mistake Facilities are not used effectively.
Dissemination-based Data Delivery Using Broadcast Disks.
Mobile Date: A Dating Application For Mobile Phones Mark Mucha and Juan Carcheri EEL-6788 Advanced Topics in Wireless Networks Spring 2010.
Service Oriented Architecture for Mobile Applications Swarupsingh Baran University of North Carolina Charlotte.
Handheld Contact Wireless syncing ACT! Blackberry and Windows Mobile 5/6.
CSCI 4550/8556 Computer Networks Comer, Chapter 22: The Future IP (IPv6)
Brewer’s Conjecture and the Feasibility of Consistent, Available, Partition-Tolerant Web Services Authored by: Seth Gilbert and Nancy Lynch Presented by:
IT 644: Mobile Computing Instructor: Sridhar Iyer Course Page Lecture Hours Tue:
1 Disk Based Disaster Recovery & Data Replication Solutions Gavin Cole Storage Consultant SEE.
Tracking & Login Data persistence User tracking.
Sleepers & Workaholics Caching Strategies in Mobile Computing Dr. Daniel Barbará Dr. Tomasz Imielinski.
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
A reactive location-based service for geo-referenced individual data collection and analysis Xiujun Ma Department of Machine Intelligence, Peking University.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
CS 290C: Formal Models for Web Software Lecture 10: Language Based Modeling and Analysis of Navigation Errors Instructor: Tevfik Bultan.
Distributed Systems 2006 Group Membership * *With material adapted from Ken Birman.
V1.00 © 2009 Research In Motion Limited Introduction to Mobile Device Web Development Trainer name Date.
7DS: Node Cooperation in Mostly Disconnected Networks Henning Schulzrinne (joint work with Arezu Moghadan, Maria Papadopouli, Suman Srinivasan and Andy.
Web Caching Schemes For The Internet – cont. By Jia Wang.
Data Warehouse View Maintenance Presented By: Katrina Salamon For CS561.
SDReaderCE An Overview on Use and Functionality. Using SDReaderCE After loading the route to the handheld from SDReader6, select the route folder from.
By: Thomas Philip What is the Cell Phone? A cell phone is a device used to talk to people who are in different locations. Cell phones have no wires and.
Client-Server Computing in Mobile Environments
NovaBACKUP 10 xSP Technical Training By: Nathan Fouarge
Network Topologies.
Internet GIS. A vast network connecting computers throughout the world Computers on the Internet are physically connected Computers on the Internet use.
Distributed Computing COEN 317 DC2: Naming, part 1.
Wang, Z., et al. Presented by: Kayla Henneman October 27, 2014 WHO IS HERE: LOCATION AWARE FACE RECOGNITION.
Mapping Internet Addresses to Physical Addresses (ARP)
Geographic Information Systems Web GIS. What is a Web GIS? ► Web GIS is an on-line version of geographic information system ► Using it, GIS data and functions.
AN OPTIMISTIC CONCURRENCY CONTROL ALGORITHM FOR MOBILE AD-HOC NETWORK DATABASES Brendan Walker.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
By: Amber Shepard   Microsoft Outlook is an client and personal information manager (PIM) that's available as part of Microsoft's Office suite.
CS 111 – Nov. 19 Enterprise databases, continued –Review tables, joins, queries –Restricting one’s view of entire database –Design considerations –Concurrency.
Distributed Computing COEN 317 DC2: Naming, part 1.
Distributed File Systems Overview  A file system is an abstract data type – an abstraction of a storage device.  A distributed file system is available.
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
© 2007 The MITRE Corporation. All rights reserved Exposing Services in a Disadvantaged Environment S. Semy, M. Sabbouh, J. Higginson, F. Dandashi
By Shruti poundarik.  Data Objects and Files are replicated to increase system performance and availability.  Increased system performance achieved.
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile Data Access1 Replication, Caching, Prefetching and Hoarding for Mobile Computing.
Client-Server Model of Interaction Chapter 20. We have looked at the details of TCP/IP Protocols Protocols Router architecture Router architecture Now.
Distributed Systems CS Consistency and Replication – Part IV Lecture 21, Nov 10, 2014 Mohammad Hammoud.
HTTP evolution - TCP/IP issues Lecture 4 CM David De Roure
Chapter 6: VALUE In the late 1990s, the development of web was quickly unwelcoming and unfriendly, many spambots were coming to inboxes and swamping online.
Enterprise Computing with Jini Technology Mark Stang and Stephen Whinston Jan / Feb 2001, IT Pro presented by Alex Kotchnev.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
NEMO Basic Support update IETF 61. Status IANA assignments done Very close to AUTH48 call Some issues raised recently We need to figure out if we want.
Movement-Based Check-pointing and Logging for Recovery in Mobile Computing Systems Sapna E. George, Ing-Ray Chen, Ying Jin Dept. of Computer Science Virginia.
Systems that support electronically executed business transactions.
GroupWise  Exchange Migration March, Reason for the change  The GroupWise system has been with WSD over 9 years  It has been a great system.
1 Wireless World Wide Web: Mobile Access to Web Resources 王讚彬 台中教育大學資訊系.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Antony Edwin Keane Inc Ltd
Client/Server Technology
The Stream Model Sliding Windows Counting 1’s
Chapter 25: Advanced Data Types and New Applications
CSE 4340/5349 Mobile Systems Engineering
Cary G. Gray David R. Cheriton Stanford University
Dissemination of Dynamic Data on the Internet
EEC 688/788 Secure and Dependable Computing
Use Cases for a Generic Information Sharing System
Mobile IP Outline Homework #4 Solutions Intro to mobile IP Operation
Ling-Jyh Chen and Ting-Kai Huang
Data Dissemination and Management (3)
Role of Alternative Networks in Registry Telecommunications
Presentation transcript:

About Me Joshua Silver  4th year CS major – graduating in May  Specialization: Databases  Interests:  The business side of computing … and no, not IT  How can companies use technology to improve and enable their business  Think Enterprise Web 2.0, mobile strategies, viral promotion on the internet, Netflix recommendation engine, e-commerce, etc. etc.  Startups!

Sleepers & Workaholics Caching Strategies in Mobile Computing Authors: Dr. Daniel Barbará and Dr. Tomasz Imielinski Presented by: Joshua Silver, Fall 2008

Sleepers & Workaholics Caching Strategies in Mobile Computing Dr. Daniel Barbará  Professor at George Mason University  Several patents associated with mobile caching Dr. Tomasz Imielinski  Professor at Rutgers University  Senior VP: Search Technology at Ask.com

The Big Picture Problem  Wireless devices have limited bandwidth, limited storage, and limited battery life  To save power, devices go offline  Mobile devices appear randomly in new cells  Makes data caching difficult since server can’t track client caches

Then and now  Paper written in 1994  Devices, bandwidth, battery limitations are different  Essential problem still exists

With an explosion of wireless devices, the problem is even greater Source: CTIA—The Wireless Association Million in 1994 >240 Million in 2008 … and that doesn’t even take into account proprietary handheld units (like UPS driver delivery computers, Amazon Kindles, grocery store handheld scanners, etc.)

Why Caching is Important Conserve: 1. Computational resources 2. Battery life 3. Network bandwidth Can’t store entire dataset on handheld. -US maps on GPS unit -Delivery routes for UPS drivers -Contact list on Blackberry

Traditional Strategies Fail In a traditional client-server model: the server keeps track of client caches pushes only the changes/sends cache invalidation messages BUT…. Server lacks knowledge of: Which units are in its cell Which units are powered ON Quintessential problem: Client caches in a mobile environment cannot be tracked by a server

The Solution Purpose: "…to propose a taxonomy of different cache invalidation strategies and study the impact of clients' disconnection times on their performance." Sleepers & Workaholics proposes a few solutions and evaluates their effectiveness with mathematical rigor

Evaluation Criteria Complicated math! …. The paper’s appendices have details. Essentially: Define two types of Mobile Units Sleepers (offline/off all the time) Workaholics (never go offline) Almost all real world devices fall in between How do you compare? Normalize by defining “hit ratio” since it affects overall throughput

Strategies to Evaluate Proposed Strategies: Timestamps (TS) Amnesic Terminals (AT) (only remembering part – like amnesia) Signatures (SIG) Control Strategy: No Cache (NC)

Timestamps -Each cache entry has a timestamp -Synchronous, history based, uncompressed in nature SERVER: Communicates with clients every n seconds (and retries until successfully connected) Sends a list of items and their associated timestamps (to accommodate for potential delay in transmission) CLIENT: For each item in cache: If entry is in received report from server, purge from cache If NOT in report, simply update timestamp to current time

Amnesic Terminals -Each cache entry has a identifier -ALSO Synchronous, history based, uncompressed in nature SERVER: Notify clients of identifiers of items changed since the last invalidation report. CLIENT: For each item in cache: ◦ If in report, purge from cache ◦ If NOT in report, do nothing ◦ ALSO, if enough time has elapsed, drop WHOLE cache and rebuild completely.

Signatures -Checksums calculated over value of data to form Signature -Since the mobile unit does not have entire database, need an algorithm to compute a partial checksum – see the appendix -Signatures combined using XOR -Synchronous, state based, compressed reports SERVER: Server broadcasts the set of combined signatures CLIENT: Item in cache is declared invalid if it belongs to “too many” unmatching signatures (suspected of being out of date)

No Cache There is no cache SERVER: Responds to direct queries from the client with appropriate information CLIENT: Query the database directly anytime item is needed

Conclusions on Effectiveness Strategy depends on circumstances: Signatures best for long sleepers, when the disconnection period is long and difficult to predict Timestamps best for query-intensive scenarios, when the rate of queries is greater than the rate of updates, provided that units are not workaholics Amnesiac Terminals is best for workaholics, units that are awake most of the time

Still not satisfied …. how can we improve effectiveness? Only 2 options: 1. Update less often or 2. Send less info

Relax the Consistency of the Cache Depending on data type, data may not need to be exact… EX: stocks, weather, etc. Allow to vary by a set tolerance (like.05% for stock prices, outdated weather reports by 2 hours, etc) Makes shorter invalidation reports possible

How Do We Decide to Update? - Consider cached copies to be quasi-copies - Each quasi-copy has a coherency condition attached to it Coherency Conditions: Delay Condition - updated based on time Arithmetic Condition - updated based on difference between data and quasi-copy

Criticism Which resources are most scarce is not really still accurate (eg. bandwidth better than predicted, longer battery life) Units rarely powered down ◦ Battery life better than predicted ◦ Battery life does not dictate use patterns … reception does also Units still lose reception frequently ◦ Today’s most common “sleeper” condition -- explicitly excluded from definition in S&W