Zone-based replication scheme for mobile ad hoc networks using cross-layer design

被引:0
|
作者
Shi, Ke [1 ]
Chen, Rong [1 ]
Jin, Hai [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Comp Sci & Technol, Serv Comp Technol & Syst Lab, Wuhan 430074, Peoples R China
关键词
ad hoc network; zone; zone routing protocol; data lookup; data replication; cross-layer design;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Accessing remote data is a challenging task in mobile ad hoc networks (MANETs). A common technique used to improve the performance of data access is replication, which improves the performance of data access in distributed systems at the cost of increased storage space and communication overhead. Due to strict resource constraint, node mobility and impairments of wireless transmission, applying replication schemes developed for distributed systems to MANETs directly leads to poor performance. In this paper, we develop a zone-based replication scheme for MANETs. In this scheme, every node proactively maintains replica distributing information within its replicating zone, which leads to the access from requesting node to the requested data item (including its replicas) distributed in its replicating zone can be satisfied directly. If requested data item is outside the replicating zone, reactive lookup process is invoked to find the node hosting the requested data item and the route to this node at the same time. Opportunistic data replicating is performed spontaneously with data transferring, and corresponding replica is allocated to nodes located in the replicating zone of the requesting node. Using cross-layer design, we illustrate how the hybrid adaptive routing technique, zone routing protocol, assists data lookup and replication to achieve high performance of data access. Simulation results have shown that our design is successful in a dynamic MANET.
引用
收藏
页码:698 / +
页数:3
相关论文
共 50 条
  • [31] Cross-layer simulation and optimization for mobile ad-hoc networks
    Beylot, AL
    Dhaou, R
    Gauthier, V
    Becker, M
    MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 13 - +
  • [32] Toward a cross-layer monitoring process for mobile ad hoc networks
    Rachedi, Abderrezak
    Benslimane, Abderrahim
    SECURITY AND COMMUNICATION NETWORKS, 2009, 2 (04) : 351 - 368
  • [33] Distributed cross-layer QoS provisioning in mobile ad hoc networks
    Li, Xuefei
    Cuthbert, Laurie
    2006 6TH INTERNATIONAL CONFERENCE ON ITS TELECOMMUNICATIONS PROCEEDINGS, 2006, : 706 - +
  • [34] A Cross-layer QoS Mapping Framework for Mobile Ad Hoc Networks
    Sarma, Nityananda
    Nandi, Sukumar
    IETE TECHNICAL REVIEW, 2008, 25 (06) : 346 - 358
  • [35] A cross-layer architecture for DiffServ in mobile ad-hoc networks
    Zou, BS
    Marshall, A
    Lee, TH
    Performance Challenges for Efficient Next Generation Networks, Vols 6A-6C, 2005, 6A-6C : 513 - 522
  • [36] A dynamic cross-layer routing protocol for Mobile Ad hoc Networks
    Hawa, Mohammed
    Taifour, Sinan
    Qasem, Mohammad
    Tuffaha, Waleed
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (12) : 996 - 1005
  • [37] Cross-layer design for optimizing the performance of clusters-based application layer schemes in mobile ad hoc networks
    Fu, Chunyan
    Glitho, Roch
    Khendek, Ferhat
    2007 4TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2007, : 239 - +
  • [38] Mobile agent based cross-layer intrusion detection system for Ad Hoc networks
    School of Information Science and Technology, Northeastern University, Shenyang 110004, China
    不详
    Gaojishu Tongxin, 2007, 11 (1107-1111):
  • [39] Mobility-aware and cross-layer based middleware for mobile ad hoc networks
    Denko, Mieso K.
    Shakshuki, Elhadi
    Malik, Haroon
    21ST INTERNATIONAL CONFERENCE ON ADVANCED NETWORKING AND APPLICATIONS, PROCEEDINGS, 2007, : 474 - +
  • [40] Geographically secure routing for mobile ad hoc networks:: A cross-layer based approach
    Koenig, Andre
    Hollick, Matthias
    Steinmetz, Ralf
    LONG-TERM AND DYNAMICAL ASPECTS OF INFORMATION SECURITY: EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, 2007, : 45 - 59