1 GroCoca: Group-based Peer-to-Peer Cooperative Caching in Mobile Environment Authors: Chi-Yin Chow, Hong Va Leong, and Alvin T. S. Chan Present: I-Wei.

Slides:



Advertisements
Similar presentations
A Construction of Locality-Aware Overlay Network: mOverlay and Its Performance Found in: IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 22, NO.
Advertisements

MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Using one level of Cache:
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
Rheeve: A Plug-n-Play Peer- to-Peer Computing Platform Wang-kee Poon and Jiannong Cao Department of Computing, The Hong Kong Polytechnic University ICDCSW.
The Effect of Consistency on Cache Response Time John Dilley and HP Laboratories IEEE Network, May-June 2000 Chun-Fu Kung System Laboratory Dept. of Computer.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Power Efficient IP Lookup with Supernode Caching Lu Peng, Wencheng Lu*, and Lide Duan Dept. of Electrical & Computer Engineering Louisiana State University.
Fall 2007cs4251 Distributed Computing Umar Kalim Dept. of Communication Systems Engineering 31/10/2007.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #13 Web Caching Protocols ICP, CARP.
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
Protecting Free Expression Online with Freenet Presented by Ho Tsz Kin I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley 14/08/2003.
Collaborative Web Caching Based on Proxy Affinities Jiong Yang, Wei Wang in T. J.Watson Research Center Richard Muntz in Computer Science Department of.
An Efficient and Scalable Pattern Matching Scheme for Network Security Applications Department of Computer Science and Information Engineering National.
1 Performance Improvement of Two-Dimensional Packet Classification by Filter Rephrasing Department of Computer Science and Information Engineering National.
An Overlay Multicast Infrastructure for Live/Stored Video Streaming Visual Communication Laboratory Department of Computer Science National Tsing Hua University.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
1 Seminar: Information Management in the Web Gnutella, Freenet and more: an overview of file sharing architectures Thomas Zahn.
1Bloom Filters Lookup questions: Does item “ x ” exist in a set or multiset? Data set may be very big or expensive to access. Filter lookup questions with.
7DS: Node Cooperation in Mostly Disconnected Networks Henning Schulzrinne (joint work with Arezu Moghadan, Maria Papadopouli, Suman Srinivasan and Andy.
1 The Mystery of Cooperative Web Caching 2 b b Web caching : is a process implemented by a caching proxy to improve the efficiency of the web. It reduces.
Improving Data Access in P2P Systems Karl Aberer and Magdalena Punceva Swiss Federal Institute of Technology Manfred Hauswirth and Roman Schmidt Technical.
7DS Seven Degrees of Separation Suman Srinivasan IRT Lab Columbia University.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Peer-to-Peer Databases David Andersen Advanced Databases.
Hybrid Prefetching for WWW Proxy Servers Yui-Wen Horng, Wen-Jou Lin, Hsing Mei Department of Computer Science and Information Engineering Fu Jen Catholic.
1 Anonymous Roaming Authentication Protocol with ID-based Signatures Lih-Chyau Wuu Chi-Hsiang Hung Department of Electronic Engineering National Yunlin.
Packet Classification using Rule Caching Author: Nitesh B. Guinde, Roberto Rojas-Cessa, Sotirios G. Ziavras Publisher: IISA, 2013 Fourth International.
Fast forwarding table lookup exploiting GPU memory architecture Author : Youngjun Lee,Minseon Jeong,Sanghwan Lee,Eun-Jin Im Publisher : Information and.
Department of Information Engineering The Chinese University of Hong Kong A Framework for Monitoring and Measuring a Large-Scale Distributed System in.
Compact Data Structures and Applications Gil Einziger and Roy Friedman Technion, Haifa.
Efficient Peer to Peer Keyword Searching Nathan Gray.
Leveraging Traffic Repetitions for High- Speed Deep Packet Inspection Author: Anat Bremler-Barr, Shimrit Tzur David, Yotam Harchol, David Hay Publisher:
Chapter 19 Binding Protocol Addresses (ARP) A frame transmitted across a physical network must contain the hardware address of the destination. Before.
Birgit Bonham: Prospect High School ARP….or What’s your MAC address?
An analysis of Skype protocol Presented by: Abdul Haleem.
1 A connection management protocol for promoting cooperation in Peer-to-Peer networks Authors: Murat Karakaya, Ibrahim Korpeoglu, and Ozgur Ulusoy Source:
Understanding IPv6 Slide: 1 Lesson 12 IPv6 Mobility.
On The Cooperation of Web Clients and Proxy Caches Yiu Fai Sit, Francis C.M. Lau, Cho-Li Wang Department of Computer Science The University of Hong Kong.
Multimedia Information System Lab. Network Architecture Res. Group Cooperative Video Streaming Mechanisms with Video Quality Adjustment Naoki Wakamiya.
Architectural Design of a Multi- Agent System for handling Metadata streams Don Cruickshank, Luc Moreau, David De Roure Department of Electronics and Computer.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of.
Computer Science and Engineering Parallel and Distributed Processing CSE 8380 April 5, 2005 Session 22.
Network Layer4-1 Today Collect homework New homework: Ch4 #16,19,21-24,26,27,29,31 (half graded, as usual) Due Wednesday Oct 15 in class Final programming.
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
Computer Science and Engineering Copyright by Hesham El-Rewini Advanced Computer Architecture CSE 8383 March 20, 2008 Session 9.
Key Establishment Scheme against Storage-Bounded Adversaries in Wireless Sensor Networks Authors: Shi-Chun Tsai, Wen-Guey Tzeng, and Kun-Yi Zhou Source:
Interleaving and Collusion Attacks on a Dynamic Group Key Agreement Scheme for Low-Power Mobile Devices * Junghyun Nam 1, Juryon Paik 2, Jeeyeon Kim 2,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Packet Classification Using Dynamically Generated Decision Trees
09/13/04 CDA 6506 Network Architecture and Client/Server Computing Peer-to-Peer Computing and Content Distribution Networks by Zornitza Genova Prodanoff.
Routing with Congestion Awareness and Adaptivity in Mobile Ad hoc Networks Duc A. Tran and Harish Raghavendra Multimedia and Collaborative Networking Group.
Stochastic Pre-Classification for SDN Data Plane Matching Author : Luke McHale, C. Jasson Casey, Paul V. Gratz, Alex Sprintson Conference: 2014 IEEE 22nd.
1 Wireless World Wide Web: Mobile Access to Web Resources 王讚彬 台中教育大學資訊系.
LightFlow : Speeding Up GPU-based Flow Switching and Facilitating Maintenance of Flow Table Author : Nobutaka Matsumoto and Michiaki Hayashi Conference:
Scalable Multi-match Packet Classification Using TCAM and SRAM Author: Yu-Chieh Cheng, Pi-Chung Wang Publisher: IEEE Transactions on Computers (2015) Presenter:
Behrouz A. Forouzan TCP/IP Protocol Suite, 3rd Ed.
Nikos Dimokas1 Dimitrios Katsaros2 (presentation)
A comparison of Ad-Hoc Routing Protocols
DISTRIBUTED CLUSTERING OF UBIQUITOUS DATA STREAMS
CSE 4340/5349 Mobile Systems Engineering
SigMatch Fast and Scalable Multi-Pattern Matching
Mobile P2P Data Retrieval and Caching
Memory-Efficient Regular Expression Search Using State Merging
A Small and Fast IP Forwarding Table Using Hashing
Lecture 1: Bloom Filters
Peer-to-Peer Information Systems Assignment #3
Presentation transcript:

1 GroCoca: Group-based Peer-to-Peer Cooperative Caching in Mobile Environment Authors: Chi-Yin Chow, Hong Va Leong, and Alvin T. S. Chan Present: I-Wei Ting IEEE Journal on Selected Areas in Communications, Vol. 25, NO. 1, January 2007 Department of Computer Science and Information Engineering National Cheng Kung University, Taiwan R.O.C.

2 Mobile P2P environments

3 Local Cache Hit

4 Mobile P2P environments Global Cache Hit

5 Mobile P2P environments Global Cache Miss

6 Related works Cooperative CAching scheme (COCA)

7 Similarity Measurement in Mobility Patterns mobile host i,jweight m0m0 m0m0 mjmj mimi Two-dimensional weighted average Distance matrix (WADM) Stored in MSS

8 Similarity Measurement in Data Access Patterns Two-dimensional access similarity matrix (ASM) Stored in MSS m0m0 m0m0 mjmj mimi

9 How to find Tightly-Coupled Group (TCG)? MSS A B C D Case 1: data request Case 2: update its location Check two tables

10

11

12

13 How to reduce the unnecessary search process? Data signature Cache signature Peer signature Search signature MSS BC D A ? ? ?

14 Bloom Filter bits h 1 ( ) h 2 ( ) h 3 ( ) h 4 ( ) … h k ( )

15 Data signature bits h 1 ( ) h 2 ( ) h 3 ( ) h 4 ( ) … h k ( ) URL, Keyword, Integral identifier Attribute value Data signature Data object:

16

17 Peer signature superimpose Cache sig. of peer A Cache sig. of peer BPeer signature

18 Search signature When an MH encounters a local cache miss, it generates a data signature for the required data item, called search signature. It also computes a peer signature by superimposing the peers’ cache signatures maintained in the local cache. The data signature is then compared with the peer signature by performing a bitwise AND operation on them.  If the result is zero, it indicates that no peer caches the required data item, so the MH bypasses the Peer Cache layer and requests the data item from the MSS.  If the result is the same as the search signature, the neighboring peers are likely to cache the data item, so the MH broadcasts the request to them.

19 Cache exchange protocol MSS A B Cache Sig. Request Cache Sig. Reply

20 Cooperative cache management Local cache miss  Search signature is true Send request to its peer (If global cache hit) From TCG member Not cache and update the TTL (Time-To-Live) From Non-TCG member Cache and update the TTL  Search signature is false Send request to MSS

21 Client Disconnection Handling Protocol Each MH maintains a list, OutstandSigList, to record members not yet turned in their cache signatures. MSS A B

22 Average latency under different cache size

23 Server request ratio under different cache size

24 Global cache ratio under different cache size

25 Power consumption under different cache size