Responsive image
博碩士論文 etd-0718101-124424 詳細資訊
Title page for etd-0718101-124424
論文名稱
Title
在無線廣播中以多重雜湊函式為基礎之節省能量資料組織
The Multiple-Hashing-Functions-Based Schemes for Energy-Saving Data Organization in the Wireless Broadcast
系所名稱
Department
畢業學年期
Year, semester
語文別
Language
學位類別
Degree
頁數
Number of pages
88
研究生
Author
指導教授
Advisor
召集委員
Convenor
口試委員
Advisory Committee
口試日期
Date of Exam
2001-07-10
繳交日期
Date of Submission
2001-07-18
關鍵字
Keywords
能源節省、無線網路、資料廣播
Power Conservation, Data Broadcast, Wireless Network
統計
Statistics
本論文已被瀏覽 5687 次,被下載 19
The thesis/dissertation has been browsed 5687 times, has been downloaded 19 times.
中文摘要
在週期性無線廣播中,空中扮演著儲存媒介的角色,需要新的資料組織和存取方法。由於可攜式單元(如掌上型電腦)的電力有限,所以如何去設計一個節省能源的資料組織是一個重要的議題。Imielinski等人提出了Hashing A與Hashing B這兩個以雜湊為基礎的方法,來在取得有興趣資料的過程中能節省能源。Hashing B這方法改善了Hashing A方法的目錄遺漏的現象。(若客戶端初聽頻道時,已錯過了包含有適當位移值的資料區塊,但在包含有鍵值的資料區塊之前,我們稱這個情形為目錄遺漏。)然而,如果最小溢位資料區塊和其他的溢位資料區塊相差非常大,或是一些小的溢位資料區塊出現在廣播檔案的後端,這將會使得這兩個方法的效能變得非常差。所以,在這篇論文我們提出FirstR、FirstL、AvgK和TopK這四個以多重雜湊函式為基礎的方法,來克服上述的情況。基本的想法是將含有N個邏輯資料區塊的廣播檔案,使用分割線分成幾區。分完之後,每一區可能會有不同大小的最小溢位資料區塊。因為每一區的最小溢位資料區塊可能會有不同的大小,所以在每一區中我們就能使用不同的雜湊函式來決定含有位移值的資料區塊的位置。在我們所提出來這四個方法中,其差異點在於如何決定分割線的位置。FirstR方法由右往左找尋分割線的位置,當兩相鄰的邏輯資料區塊之後溢位資料區塊相差值大於或等於1,就決定分割線的位置。FirstL方法由左往右找尋分割線的位置,當兩相鄰的邏輯資料區塊之後溢位資料區塊相差值大於或等於1,就決定分割線的位置。在AvgK方法中,我們先算出AvgD(為所有兩相鄰溢位區塊的差異值大於等於1的平均值),接下來由左往右找分割線,當兩相鄰的邏輯資料區塊之後溢位資料區塊相差值大於或等於AvgD,就決定分割線的位置。TopK方法由溢位區塊的差異值遞減順序,來決定分割線的位置。在我們的效能分析與模擬研究中,我們發現TopK方法是我們所提出的方法中效能最好的方法,所以我們拿TopK方法來和Hashing B方法做比較。由於TopK方法的雜湊函數的數量比Hashing B方法多,所以TopK方法的實際資料區塊會比Hashing B方法來得大。我們的模擬程式也考慮了這一點。經由我們的效能分析與模擬研究,即使考慮了上述資料儲存大小的因素,TopK方法的效能仍然比Hashing B來得好。TopK方法改善Hashing B方法的目錄遺漏,所以平均的存取時間被改進了很多。
Abstract
In periodic wireless broadcasting, air behaves like a storage medium requiring new data organization and access methods.Due to power limit for the portable units (ex. the palmtop), how to design an energy-saving organization is a key issue.Imielinski et al. have proposed the hashing based schemes, including the Hashing A and Hashing B schemes, to save energy in the progress of getting data of interest. The Hashing B scheme improves the directory miss phenomenon in the Hashing A scheme, where the directory miss is that the client's initial probe comes before
the bucket containing his key but after the bucket which contains a proper offset. However, based on these two schemes, if the differences between the minimum overflow and the other overflows are large extremely or the small overflows appear near the rear part of the broadcast file, both schemes have a poor performance. Therefore, in this thesis, we propose four multiple-hashing-functions-based
schemes, including the FirstR, FirstL, AvgK and TopK schemes, to overcome such the situations.
The basic idea is to use cutlines to divide the
broadcast file with N logical buckets into several regions, and then each region may have
the different minimum overflow. Since the minimum overflow in each region can be different, we can have different hashing functions for those regions to determine the positions of the designated buckets.
Among the proposed schemes, the difference is how to determine the positions of the cutlines. The FirstR scheme finds those cutlines from the right end to the left whenever the difference of overflows of two adjacent logical buckets is greater than or equal to 1. The FirstL scheme finds those cutlines from the left end to the right whenever the difference of overflows of two adjacent logical buckets is greater than or equal to 1. In the AvgK scheme, we first calculate AvgD, the average of the differences of two consecutive overflows whose values are large than or equal to 1. Then we find cutlines from the left end to the right whenever the difference of
two adjacent logical buckets is greater than or equal to AvgD. The TopK determines the cutlines by considering the descending order of the differences of overflows. From our performance analysis and simulation study, the
performance of the TopK scheme is the best among the proposed schemes. Therefore, we then make a comparison between the TopK scheme and the Hashing B scheme. Since the number of the hashing functions in the TopK scheme is larger than those in the Hashing B, the physical bucket in the TopK scheme is somewhat bigger than that in the m Hashing B scheme. In our simulation, we have considered this factor as well. From our performance analysis and simulation study, we show that the performance of the TopK scheme performs better than that of the Hashing B
scheme, even though the above factor about the storage size is considered. The TopK scheme improves the directory miss in the Hashing B scheme; therefore, the average access time is
improved excellently.
目次 Table of Contents
LIST OF FIGURES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii
LIST OF TABLES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Special Features of Mobile Environments . . . . . . . . . . . . . . . . 2
1.2 Energy-Saving Data Organization . . . . . . . . . . . . . . . . . . . . 4
1.3 Hashing Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3.1 Hashing A . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3.2 Hashing B . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.4 Motivations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.5 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2. A Survey of Energy-Saving Data Organization . . . . . . . . . . . . 18
2.1 Indexing Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.1.1 Access Time Optimum . . . . . . . . . . . . . . . . . . . . . . 18
2.1.2 Tuning Time Optimum . . . . . . . . . . . . . . . . . . . . . . 19
2.1.3 Flexible Indexing . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.1.4 (1,m) Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.1.5 Index Distribution Methods . . . . . . . . . . . . . . . . . . . 22
2.2 Signature Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2.2.1 The Simple Signature Scheme . . . . . . . . . . . . . . . . . . 28
2.2.2 The Integrated Signature Scheme . . . . . . . . . . . . . . . . 29
2.2.3 Multi-level Signature Scheme . . . . . . . . . . . . . . . . . . 30
2.2.4 The Hybrid Index Approach . . . . . . . . . . . . . . . . . . . 31
2.3 Non-uniform Broadcast . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3. The Multiple-Hashing-Functions-Based Schemes . . . . . . . . . . 34
3.1 Assumptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.2 Basic Steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.3 The FirstR Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
3.4 The FirstL Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.5 The AvgK Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.6 The TopK Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
3.7 Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4. Performance Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
4.1 Generation of Over ows . . . . . . . . . . . . . . . . . . . . . . . . . 56
4.2 Performance Analysis of Access Time and Tuning Time . . . . . . . . 58
4.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
4.3.1 A Comparison of the FirstR, FirstL, AvgK and TopK Schemes 60
4.3.2 A Comparison of the TopK and Hashing B Schemes . . . . . . 71
5. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.2 Future Research Directions . . . . . . . . . . . . . . . . . . . . . . . 82
BIBLIOGRAPHY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
參考文獻 References
[1] S. Acharya, M. Franklin, S. Zdonik and R. Alongso, "Broadcast Disks: Data
Management for Asymmetric Communications Environments," Proc. of the 1995
ACM SIGMOD Int'l Conf. on Management of Data, pp. 199-210, San Jose, May
1995.
[2] D. Barbar a, "Mobile Computing and Database - A Survey," IEEE Trans. on
Knowledge and Data Engineering, Vol. 11, No. 1, pp. 108-117, Jan./Feb. 1999.
[3] C. C. Chen, "Compression-based Broadcast Data for Reducing Access Time in
Wireless Environment," Proc. of 1999 National Computer Symposium, Vol. 3,
pp. 539-546, 1999.
[4] M.-S. Chen, P. S. Yu and K.-L. Wu, "Indexed Sequential Data Broadcasting in
Wireless Mobile Computing," Proc. of the 17th IEEE Int'l Conf. on Distributed
Computing Systems, pp. 124-131, May 1997.
[5] Y. D. Chung and M. H. Kim, "An Index Replication Scheme for Wireless Data
Broadcasting," Journal of Systems and Software, Vol. 51, No. 3, pp. 191-199,
May 2000.
[6] A. Datta, A. Celik, J. Kim and D. E. VanderMeer, "Adaptive Broadcast Proto-
cols to Support Power Conservant Retrieval by Mobile Users," Proc. of the 13th
Int'l Conf. on Data Engineering, pp.124-133, 1997.
[7] A. Datta, D. E. VanderMeer, A. Celik and V. Kumar, "Broadcast Protocols to
Support EÆcient Retrieval from Databases by Mobile Users," ACM Trans. on
Database Systems, Vol. 24, No. 1, pp. 1-79, Mar. 1999.
[8] V. Gondhalekar, R. Jain and J. Werth, "Scheduling on Airdisks: EÆcient Access to Personalized Information Services via Periodic Wireless Data Broadcast," Poc.of IEEE Int'l Conf. on Communications, Vol. 3, pp. 1276-1280, 1997.
[9] Q. L. Hu, W.-C. Lee and D. L. Lee, "Indexing Techniques for Wireless Data
Broadcast Under Data Clustering and Scheduling," Proc. of the Eighth Int'l
Conf. on Information and Knowledge Management, pp. 351-358, Nov. 2-6 1999.
[10] T. Imielinski, S. Viswanathan and B. R. Badrinath, "Power EÆcient Filtering
of Data on Air." Proc. of the 4th Int'l Conf. on EDBT Extending DataBase
Technology), Cambridge-U.K, pp. 245-258, March 1994.
[11] T. Imielinski, S. Viswanathan and B. R. Badrinath, "Energy EÆcient Indexing
on Air," Proc. of ACM-SIGMOD Int'l Conf. on Data Management, Minnesota,pp. 25-36, May 1994.
[12] T. Imielinski and H. Korth, "Mobile Computing," Kluwer Academic Publishers,
1996.
[13] T. Imielinski, S. Viswanathan and B. R. Badrinath, "Data on Air : Organization and Access," IEEE Trans. on Knowledge and Data Engineering, Vol. 9, No. 3,
pp. 353{372, May-June 1997.
[14] W.-C. Lee and D. L. Lee, "Using Signature and Caching Techniques for Information Filtering in Wireless and Mobile Environments," Distributed and Parallel Databases, Vol. 4, No. 3, pp. 205-227, July 1996.
[15] D. L. Lee and W.-C. Lee, "On Signature Caching of Wireless Broadcast and
Filtering Services," Proc. of the 2nd International Mobile Computing Workshop,
pp. 15-24, March 1996.
[16] W.-C. Lee and D. L. Lee, "Information Filtering in Wireless and Mobile Environments," Proc. of the 15th IEEE Int'l Conf. on Computers and Communications, pp. 508-514, 1996.
[17] W.-C. Lee and D. L. Lee, "Signature Caching Techniques for Information Filtering in Mobile Environments," ACM Wireless Networks, Vol. 5, No. 1, pp. 57-67, Jan. 1999.
[18] H. V. Leong and A. Si, "Data Broadcasting Strategies over Multiple Unreliable Wireless Channels," Proc. of the 4th Int'l Conf. on Information and Knowledge Management, pp. 96-104, 1995.
[19] S.-C. Lo and A. L. P. Chen, "Optimal Index and Data Allocation in Multiple
Broadcast Channels," Proc. of the 16th IEEE Int'l Conf. on Data Engineering,
pp. 293-302, 2000.
[20] S.-C. Lo and A. L. P. Chen, An Adaptive Access Method for Broadcast Data
under an Error-Prone Mobile Environment," IEEE Trans. on Knowledge and
Data Engineering, Vol. 12, No. 4, pp. 609-620, July/Aug. 2000.
[21] K. L. Tan and J. X. Yu, "Energy EÆcient Filtering of Nonuniform Broadcast,"
Proc. of the 16th IEEE Int'l Conf. on Distributed Computing Systems, pp.520-527, May 1996.
[22] K. L. Tan and J. X. Yu, "Generating Broadcast Programs that Support Range
Queries," IEEE Trans. on Knowledge and Data Engineering, Vol. 10, No. 4, pp.
668-672, July/Aug. 1998.
[23] K. L. Tan and B. C. Ooi, "On Selective Tuning in Unreliable Wireless Channels," Data and Knowledge Engineering, Vol. 28, No. 2, pp. 209-231, Nov. 1998.
[24] K. L. Tan, J. X. Yu and P.-K. Eng, "Supporting Range Queries in a Wireless
Environment with Nonuniform Broadcast," Data and Knowledge Engineering,
Vol. 29, No. 2, pp. 201{221, Feb. 1999.
[25] N. Shivakumar and S. Venkatasubramanian, "EÆcient Indexing for Broadcast
Based Wireless Systems," ACM/Baltzer Mobile Networks and Applications, Vol.
1, No. 4, pp. 433-446, Jan. 1996.
[26] J. X. Yu and K. L. Tan, "An Analysis of Selective Tuning Schemes for Nonuni
form Broadcast," Data and Knowledge Engineering, Vol. 22, No. 3, pp. 319-344,
May 1997.
電子全文 Fulltext
本電子全文僅授權使用者為學術研究之目的,進行個人非營利性質之檢索、閱讀、列印。請遵守中華民國著作權法之相關規定,切勿任意重製、散佈、改作、轉貼、播送,以免觸法。
論文使用權限 Thesis access permission:校內公開,校外永不公開 restricted
開放時間 Available:
校內 Campus: 已公開 available
校外 Off-campus:永不公開 not available

您的 IP(校外) 位址是 3.128.205.109
論文開放下載的時間是 校外不公開

Your IP address is 3.128.205.109
This thesis will be available to you on Indicate off-campus access is not available.

紙本論文 Printed copies
紙本論文的公開資訊在102學年度以後相對較為完整。如果需要查詢101學年度以前的紙本論文公開資訊,請聯繫圖資處紙本論文服務櫃台。如有不便之處敬請見諒。
開放時間 available 已公開 available

QR Code