Overload-driven mobility-aware cache management in wireless environments

Humeyra Topcu-Altintas, Yun Huang, Nalini Venkatasubramanian

Research output: Chapter in Book/Entry/PoemConference contribution

1 Scopus citations

Abstract

In this paper, we propose a novel cache management strategy that uses the notion of "overload" where overload is defined as a situation when there is insufficient proxy cache for a new incoming user in a mobile region. In an overloaded situation, there will be increased network traffic (since the original server will need to be contacted) and increased service delays for mobile hosts (due to cache misses). The proposed techniques attempt to decrease the penalty of overloaded traffic and to reduce the number of remote accesses by increasing cache hit ratio. Our cache replacement algorithm is holistic in that it considers (i) mobility of the clients, (ii) predicted overloads, (iii) sizes of cached objects and (iv) their access frequencies in determining which object's cache (how much cache space) to be replaced, and when to replace. Performance results show that our overload-driven cache management strategy outperforms the existing popular policies.

Original languageEnglish (US)
Title of host publication2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous - Workshops
DOIs
StatePublished - 2006
Externally publishedYes
Event2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous - San Jose, CA, United States
Duration: Jul 17 2006Jul 21 2006

Publication series

Name2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous - Workshops

Other

Other2006 3rd Annual International Conference on Mobile and Ubiquitous Systems, MobiQuitous
Country/TerritoryUnited States
CitySan Jose, CA
Period7/17/067/21/06

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Overload-driven mobility-aware cache management in wireless environments'. Together they form a unique fingerprint.

Cite this