Skip to main content

The Reseach on Distributed Data Storage Method Based on Composite Threshold

  • Conference paper
Advances in Computer Science, Environment, Ecoinformatics, and Education (CSEE 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 215))

  • 1777 Accesses

Abstract

This paper presents a distributed data storage method based on sleep scheduling to resolve the problems of network imbalance and storage hot spots problems. Compared with existing methods, our distributed data storage method has the following advantages: First, take node’s residual energy into account when decides the order of storage node. This can avoid choosing the lower residual energy node blindly which closer to the hash location as frequently data storage node. Second, set a scheduling factor p for each node, which determined by its storage space and residual energy. As the scheduling factor p changes, sensor node switching the state between suspended state and active state, this can turn off the redundant node and reduce unnecessary energy consumption. Finally, multi group analysis of simulate experiments results show that compared to other data storage method the distributed data storage method based on composite threshold have obviously advantages on the sides of overall energy consumption, data storage capacity, the number of failure node and data quality, thus have a significant effect on reducing energy consumption and extending network life cycle.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Albano, M., Chessa, S.: Publish/subscribe in wireless sensor networks based on data centric storage. In: Proceedings of the 1st International Workshop on Context-Aware Middleware and Services, CAMS 2009, pp. 37–42 (2009)

    Google Scholar 

  2. Yu, Z., Xiao, B., Zhou, S.: Achieving 0ptimal data storage position in wireless sensor networks. Computer Communications 33(1), 92–102 (2010)

    Article  Google Scholar 

  3. Ratnasamy, S., Karp, B., Yin, L., Yu, F., Estrin, D., Govindan, R., Shenker, S.: GHT: A geographic hash table for data-centric storage. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, pp. 78–87 (2002)

    Google Scholar 

  4. Mathur, G., Desnoyers, P., Ganesan, D.: Ultra-low power data storage for sensor networks. In: Proc. of the 5th Interntional Conference on Information Processing in Sensor Networks, pp. 374–381. ACM Press, New York (2006)

    Google Scholar 

  5. Ren, Y., Shchuk, V., Li, F.Y.: A Distributed data storage and retrieval scheme in unattended WSNs using homomorphic encryption and secret sharing. In: 2009 2nd IFIP Wireless Days (WD), vol. 15, pp. 1–6 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fuqiang, Y. (2011). The Reseach on Distributed Data Storage Method Based on Composite Threshold. In: Lin, S., Huang, X. (eds) Advances in Computer Science, Environment, Ecoinformatics, and Education. CSEE 2011. Communications in Computer and Information Science, vol 215. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23324-1_94

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23324-1_94

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23323-4

  • Online ISBN: 978-3-642-23324-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics