Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks

Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks

Mieso K. Denko (University of Guelph, Canada)
DOI: 10.4018/978-1-60566-148-3.ch014
OnDemand PDF Download:


This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts cooperate in both prefetching and caching commonly used data. To reduce communication and computational overhead, we use a clustering architecture for the network organization. A weak consistency based on time to live value was used to maintain data consistency. A hybrid cache replacement policy that uses frequency of access and the reference time was employed. The effects of cache size, mobility, and prefetching threshold on the network performance were investigated in a discrete event simulation environment. The contribution of intra-cluster and inter- cluster information to overall data accessibility ratio was also investigated. The simulation results indicate that the proposed scheme improves both data accessibility and query delay at relatively lower prefetch thresholds, larger cache sizes, and moderate mobility.
Chapter Preview


In the past few years, most of the research devoted to MANETs has focused on the development of routing protocols to increase connectivity among mobile hosts in a constantly varying topology (Fan et al., 1998; Johnson & Maltz, 1996; Perkins & Bhagwat, 1994). Although development of routing protocols is one of the main challenges that must be addressed, improved data accessibility is the ultimate goal of such networks. In order to enable quick deployment of MANETs, development of reliable and efficient data management schemes suitable for this network environment is crucial. Data caching and prefetching techniques used in traditional wireless networks can be extended to be used in MANETs . In this paper, we investigate the use of caching and prefetching techniques for improving data accessibility and reducing latency in MANET environments.

Caching has been utilized extensively in wired networks, such as the Internet, to increase the performance of web services (Fan et al., 1998; Rousskov & Wessels, 1999; Wang 1999; Wessels & Claffy, 2005). However, existing cooperative caching schemes cannot be implemented directly in MANETs due to host mobility and resource constraints that characterize these networks. Consequently, new approaches have been proposed to tackle these challenges (Cao et al., 2004; Hara, 2002; Lim et al., 2003; Papadopoui & Schulzrinnr, 2001; Wang, 2005; Yin & Cao, 2006). These approaches have been introduced to increase data accessibility and reduce query delay in MANETs. A cooperative cache-based data access scheme is subsequently proposed for ad hoc networks (Cao et al., 2004; Yin & Cao, 2006). Three caching

techniques, namely CacheData, CachePath, and HybridCache, are utilized as caching approaches. In CacheData, the intermediate hosts, which are located along the path between the source host and the destination host, cache frequently accessed data items. In CachePath, the intermediate hosts record the routing path information of passing data. CachePath only records the data path when it is closer to the caching host than the data source. The HybridCache technique represents a combination of CacheData and CachePath. This technique performs better than either the CachePath or CacheData approach. The cache replacement algorithm in HybridCache is based upon the access frequency of a data item and the distance to the same cached copy or to the data source. However, due to the inherent mobility of the host, such distances can change frequently. Moreover, the authors did not consider prefetching and multiple data sources in their study. In Lim et al. (2003), a similar approach is proposed for data caching in a network that integrates ad hoc networks with the Internet.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Indranil Bose
Chapter 1
Varadharajan Sridhar
Telecom operators have a wide variety of functions to perform including marketing of telecom products and services, managing their networks... Sample PDF
Strategic Outsourcing: Opportunities and Challenges for Telecom Operators
Chapter 2
Sami J. Habib
This article presents a computer-aided integration tool, iCAD, that can predict a network evolution. We have used the term a network evolution to... Sample PDF
Empirical Prediction of Computer-Network Evolution
Chapter 3
Hak Ju Kim
This article seeks to develop a richer understanding of the suitability of IP telephony in the Public Switched Telephony Network (PSTN) with an... Sample PDF
Suitability of IP Telephony in the Public Switched Telephone Network (PSTN): A Case Study
Chapter 4
Abid Al Ajeeli
This chapter describes a detailed framework configuration infrastructure design for a high performance network. The configuration is described based... Sample PDF
A Framework for High-Speed Networking
Chapter 5
Nurul I. Sarkar, Catherine Byrne, Nabeel A.Y. Al-Qirim
Ethernet network technology is still one of the most popular LAN technologies in use today by many organizations and educational institutions... Sample PDF
Updating on Gigabit Ethernet Implementation: The Case of a Large New Zealand Organization
Chapter 6
M. Chandrasekaran, R. S.D. Wahida Banu
This chapter introduces and analyses a class of non-linear congestion control algorithms called polynomial congestion control algorithms. These... Sample PDF
Interaction Between MIMD-Poly & PIPD-Poly Algorithms and other TCP Variants in Multiple Bottleneck TCP Networks
Chapter 7
Xabiel G. Pañeda
This chapter presents a method for performance analysis and configuration of audio/video-on-demand services. These kind of services makes use of an... Sample PDF
A Systematic Approach to the Analysis and Configuration of Audio/Video-on-Demand Services
Chapter 8
Say Ying Lim
As more and more servers appearing in the wireless environment provide accesses to mobile users, more and more demand and expectation is required by... Sample PDF
Mobile Information Processing Involving Multiple Non-Collaborative Sources
Chapter 9
Vilmos Simon
In the next generation IP-based mobile networks, one of the most important QoS parameters are the delay and the delay variation. The cell handover... Sample PDF
Network Planning Algorithms for Optimizing Signalling Load in Mobile Networks
Chapter 10
Joon-Yeoul Oh, John P. Mullen
This chapter proposes a very effective heuristic algorithm to address a variation of the cellular network expansion problem and discusses each... Sample PDF
A Heuristic Solution to the Large Scale Cellular Telecommunication Network Expansion Problem
Chapter 11
Manuel Vilas
This article introduces a distributed system, called wireless proxy, to mitigate the effects of user mobility over streaming services on IEEE 802.11... Sample PDF
Wireless Proxy: Distributed System to Mitigate the Effects of User Mobility Over Streaming Services on IEEE 802.11 Wireless LANs
Chapter 12
R. Radhakrishnan, K. R. Shankarkumar, A. Ebenezer Jeyakumar
In this chapter, we propose a new scheme for Multi User Detection (MUD) using Parallel Interference Cancellation (PIC) technique. This technique... Sample PDF
Soft Decision Parallel Interference Cancellation for Multi-Carrier DS-CDMA
Chapter 13
Ghassan Kbar
This chapter introduces a new radio resource management technique based on distributed dynamic channel assignment, and sharing load among Access... Sample PDF
Distributed Resources Management in Wireless LANs that Support Fault Tolerance
Chapter 14
Mieso K. Denko
This article proposes a cooperative data caching and prefetching scheme for Mobile Ad Hoc Networks (MANETs). In this scheme, multiple hosts... Sample PDF
Cooperative Data Caching and Prefetching in Wireless Ad Hoc Networks
Chapter 15
Essam Natsheh
The challenge in creating a routing protocol for ad-hoc networks is to design a single protocol that can adapt to the wide variety of conditions... Sample PDF
A Survey on Fuzzy Reasoning Applications for Routing Protocols in Wireless Ad-Hoc Networks
Chapter 16
Essam Natsheh
Mobile ad-hoc network is a network without infrastructure, where every node has its own protocols and services for powerful cooperation in the... Sample PDF
Fuzzy Linguistic Knowledge for Active Queue Management in Wireless Ad-Hoc Networks
Chapter 17
Yun Wang, Lee Seidman
The use of network traffic audit data for retrieving anomaly intrusion information and profiling user behavior has been studied previously, but the... Sample PDF
Risk Factors to Retrieve Anomaly Intrusion Information and Profile User Behavior
Chapter 18
Rania Wehbi
In Inter-Vehicle Communication (IVC) networks, the high mobility and lack of infrastructure pose major challenges in designing secure routing... Sample PDF
Network Setup for Secure Routing in Inter-Vehicle Communication Networks
Chapter 19
Antonios Alexiou, Christos Bouras, John Papagiannopoulos, Dimitrios Primpas
This chapter presents the design principles that cover the implementation of broadband infrastructure in the region of Western Greece, by examining... Sample PDF
Metropolitan Broadband Networks: Design and Implementation Aspects, and Business Models
About the Contributors