skip to main content
10.1145/1023756.1023760acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
Article

Data replication effectiveness in mobile ad-hoc networks

Published: 04 October 2004 Publication History

Abstract

In this paper the behavior of a MANET when, for several reasons, the node density varies in such a way to cause subnet disconnections, is considered. Data replication is usually employed to avoid data loss in case of unwanted disconnection of a node, increasing its availability. Considering a time-scale connectivity and node mobility, replicas can be distributed over the net, in order to make data available even during disconnection periods.A formula can be derived, which allows to evaluate the replica availability in different scenarios, using the probability density functions describing the partitioning of a network obtained by a simulator. Applying this formula to different kind of networks, it is possible to tune the degree of replication desired for different scenarios, looking for a trade-off between space occupancy and availability gain.

References

[1]
C. Bettstetter. On the minimum node degree and connectivity of a wireless multihop network. In MOBIHOC Conference Proceedings. ACM, 2002.
[2]
C. Bettstetter and O. Krause. On border effects in modeling and simulation of wireless ad hoc networks. In Mobile and Wireless Comm. Netw. (MWCN)Conference Proceedings, August 2001.
[3]
S. Chessa and P. Maestrini. Dependable and secure data storage and retrieval in mobile, wireless networks. In Dependable Systems and Networks (DSN'03)Conference Proceedings, 2003.
[4]
O. Dousse, P. Thiran and M. Hasler. Connectivity in ad hoc and hybrid networks. In INFOCOM Conference Proceedings. IEEE, 2002.
[5]
T. Hara. Effective replica allocation in ad hoc networks for improving data accessibility. In INFOCOM Conference Proceedings, pages 1568--1576. IEEE, 2001.
[6]
M. Mamei and F. Zambonelli. Programming pervasive and mobile computing applications with the tota middleware. In Pervasive Computing and Communications (PerCom 2004) Conference Proceedings. IEEE, March 2004.
[7]
R. Meester and R. Roy. Continuum Percolation. Cambridge University Press, 1996.
[8]
S. Olafsson. Modelling capacity and local connectivity in ad hoc networks. http://research.btexact.com/teralab/sverrirolafsson.html. Complexity Research Group.
[9]
T.K. Philips, S.S. Panwar and A.N. Tantawi. Connectivity properties of a packet radio network model. IEEE Trans. Inf. Theory, 35(5):1044--1047, 1989.
[10]
M.O. Rabin. Efficient dispersal of information for security, load balancing and fault tolerance. ACM Journal, 36(2):335--348, April 1989.
[11]
E.M. Royer, P.M. Melliar-Smith and L. Moser. An analysis of the optimum node density for ad hoc mobile networks. In Int. Conference on Communications Proceedings. IEEE, March 2001.

Cited By

View all
  • (2019) Data replication techniques in the mobile ad hoc networks International Journal of Pervasive Computing and Communications10.1108/IJPCC-06-2019-0051ahead-of-print:ahead-of-printOnline publication date: 16-Oct-2019
  • (2015)Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File SharingIEEE Transactions on Computers10.1109/TC.2014.230821164:4(1029-1042)Online publication date: 9-Mar-2015
  • (2015)Cooperative hybrid self‐healing scheme for secure and data reliability in unattended wireless sensor networksIET Information Security10.1049/iet-ifs.2014.02679:4(223-233)Online publication date: Jul-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
PE-WASUN '04: Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
October 2004
136 pages
ISBN:1581139594
DOI:10.1145/1023756
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2004

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. data availability
  2. data replication
  3. mobile ad hoc networks
  4. network topology

Qualifiers

  • Article

Conference

MSWiM04
Sponsor:

Acceptance Rates

Overall Acceptance Rate 70 of 240 submissions, 29%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019) Data replication techniques in the mobile ad hoc networks International Journal of Pervasive Computing and Communications10.1108/IJPCC-06-2019-0051ahead-of-print:ahead-of-printOnline publication date: 16-Oct-2019
  • (2015)Maximizing P2P File Access Availability in Mobile Ad Hoc Networks though Replication for Efficient File SharingIEEE Transactions on Computers10.1109/TC.2014.230821164:4(1029-1042)Online publication date: 9-Mar-2015
  • (2015)Cooperative hybrid self‐healing scheme for secure and data reliability in unattended wireless sensor networksIET Information Security10.1049/iet-ifs.2014.02679:4(223-233)Online publication date: Jul-2015
  • (2013)SCALARComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2013.08.01257:17(3654-3672)Online publication date: 1-Dec-2013
  • (2012)The design of a fault management framework for cloud2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology10.1109/ECTICon.2012.6254358(1-4)Online publication date: May-2012
  • (2011)Global optimization of file availability through replication for efficient file sharing in MANETsProceedings of the 2011 19th IEEE International Conference on Network Protocols10.1109/ICNP.2011.6089056(226-235)Online publication date: 17-Oct-2011
  • (2010)Implementation of data survival in unattended Wireless Sensor Networks using cryptographyProceedings of the 2010 IEEE 35th Conference on Local Computer Networks10.1109/LCN.2010.5735841(961-967)Online publication date: 10-Oct-2010
  • (2009)Data Security in Unattended Wireless Sensor NetworksIEEE Transactions on Computers10.1109/TC.2009.10958:11(1500-1511)Online publication date: 1-Nov-2009
  • (2009)New adversary and new threatsIEEE Network: The Magazine of Global Internetworking10.1109/MNET.2009.480433523:2(43-48)Online publication date: 1-Mar-2009
  • (2009)SCALAR data replication performance in mobile ad hoc applications2009 24th International Symposium on Computer and Information Sciences10.1109/ISCIS.2009.5291808(369-374)Online publication date: Sep-2009
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media