Update-based cache access and replacement in wireless data access

被引:0
|
作者
Chen, Hui
Xiao, Yang
Shen, Xuemin
机构
[1] Univ Memphis, Dept Comp Sci, Memphis, TN 38152 USA
[2] Univ Alabama, Dept Comp Sci, Tuscaloosa, AL 35487 USA
[3] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
cache replacement policy; access; update; wireless network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cache has been applied for wireless data access with different replacement policies in wireless networks. Most of the current cache replacement schemes are access-based replacement policies since they are based on object access frequency/recency information. Access-based replacement policies either ignore or do not focus on update information. However, update information is extremely important since it can make access information almost useless. In this paper, we consider two fundamental and strongly consistent access algorithms: Poll-Per-Read ( PER) and Call-Back ( CB). We propose a server-based PER (SB-PER) cache access mechanism in which the server makes replacement decisions and a client-based CB cache access mechanism in which clients make replacement decisions. Both mechanisms have been designed to be suitable for using both update frequency and access frequency. We further propose two update-based replacement policies, least access-to-update ratio (LA2U) and least access-to-update difference ( LAUD). We provide a thorough performance analysis via extensive simulations for evaluating these algorithms in terms of access rate, update rate, cache size, database size, object size, etc. Our study shows that although effective hit ratio is a better metric than cache hit ratio, it is a worse metric than transmission cost, and a higher effective hit ratio does not always mean a lower cost. In addition, the proposed SB-PER mechanism is better than the original PER algorithm in terms of effective hit ratio and cost, and the update-based policies outperform access-based policies in most cases.
引用
收藏
页码:1734 / 1748
页数:15
相关论文
共 50 条
  • [31] A Cloud Data Access Authorization Update Scheme Based on Blockchain
    Lei, Yanfang
    Jia, Zhijuan
    Yang, Yanyan
    Cheng, Yage
    Fu, Junjun
    2020 3RD INTERNATIONAL CONFERENCE ON SMART BLOCKCHAIN (SMARTBLOCK), 2020, : 33 - 38
  • [32] Data Access History Cache and Associated Data Prefetching Mechanisms
    Chen, Yong
    Byna, Surendra
    Sun, Xian-He
    2007 ACM/IEEE SC07 CONFERENCE, 2010, : 63 - 74
  • [33] An optimal cache replacement policy for wireless data dissemination under cache consistency
    Xu, JL
    Hu, QL
    Lee, WC
    Lee, DL
    PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING, 2001, : 267 - 274
  • [34] Access Trends of In-network Cache for Scientific Data
    Han, Ruize
    Sim, Alex
    Wu, Kesheng
    Monga, Inder
    Guok, Chin
    Wurthwein, Frank
    Davila, Diego
    Balcas, Justas
    Newman, Harvey
    PROCEEDINGS OF THE FIFTH INTERNATIONAL WORKSHOP ON SYSTEMS AND NETWORK TELEMETRY AND ANALYTICS, SNTA 2022, 2022, : 21 - 28
  • [35] High performance cache management for sequential data access
    Rahm, Erhard
    Ferguson, Donald
    Performance Evaluation Review, 1992, 20 (01):
  • [36] Data cache and direct memory access in programming mediaprocessors
    Kim, D
    Managuli, R
    Kim, Y
    IEEE MICRO, 2001, 21 (04) : 33 - 42
  • [37] Access Map Pattern Matching for Data Cache Prefetch
    Ishii, Yasuo
    Inaba, Mary
    Hiraki, Kei
    ICS'09: PROCEEDINGS OF THE 2009 ACM SIGARCH INTERNATIONAL CONFERENCE ON SUPERCOMPUTING, 2009, : 499 - 500
  • [38] CACHE MEMORIES QUICKEN ACCESS TO DISK DATA.
    Krastins, Uldis
    1600, (30):
  • [39] Scalable cache invalidation algorithms for mobile data access
    Elmagarmid, A
    Jing, J
    Helal, A
    Lee, CH
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (06) : 1498 - 1511
  • [40] Cache data access system in ad hoc networks
    Moriya, T
    Aida, H
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 1228 - 1232