Downloads: 110 | Views: 273
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 6.7 / 10
Distributed Cache Invalidation Method using Extended Adaptive Time to Live Mechanism for Cache Consistency in Wireless Mobile Network
Sonali S. Shukla, Yashwant Ingle
Abstract: DCIM is a Distributed Cache Invalidation Method is used for maintaining cache consistency in wireless mobile network. DCIM is analysed for assessing delay time and bandwidth gain and compared for polling time. DCIM is a client based cache consistency schemes for caching data in wireless mobile network. DCIM is also used as a pull based algorithm for implementing Time to live, piggybacking and prefetching. An adaptive time to live (ATTL) For cache maintenance an adaptive TTL mechanism is used in DCIM that has update rates of data sources to update cache, where expired TTL values is grouped in validation requests rates are prefetched from the server. Existing system has used an adaptive TTL mechanism which contains some limitations like maximum request time, degraded system performance due to which the speed of communication reduces and data received is not reliable. Here the cache maintenance will be doing using EX-ATTL mechanism which will provide hash table for cache invalidation between each 1-hop distance node to data cache node. In this paper all this mechanism will reduce the overhead of the cache node to increase the speed of communication. This proposed mechanism will also reduce the request data delay time due to which the system performance get improved and will provide a reliable data.
Keywords: Server, Access point, Cache maintenance, Query directory, DCIM, AODV, TTL, Request node, Intermediate nodes
Edition: Volume 4 Issue 4, April 2015
Pages: 2512 - 2516
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 0
Analysis Study Research Paper, Computer Science & Engineering, United States of America, Volume 13 Issue 1, January 2024
Pages: 324 - 329Optimizing Data Centers for Sustainability: The Role of Serverless Fog Computing in Artificial Intelligence
Jatin Pal Singh
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 12, December 2022
Pages: 962 - 966Blockchain Based Certificate Validation
Srilatha Puli, Kandhi Vaman Reddy, Kankanala Vinay, Mughaisa Fatima
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar