skip to main content
research-article

Infrastructureless Spatial Storage Algorithms

Published:01 June 2011Publication History
Skip Abstract Section

Abstract

This article defines and analyzes a collection of algorithms for persistent storage of data at specific geographical zones exploiting the memory of mobile devices located in these areas. Contrarily to other approaches for data dissemination, our approach uses a viral programming model. Data performs an active role in the storage process. It acts as a virus or a mobile agent, finding its own storage and relocating when necessary. We consider geographical areas of any shape and size. Simulation results show that our algorithms are scalable and converge quickly, even though none of them outperform the others for all performance metrics considered.

Skip Supplemental Material Section

Supplemental Material

References

  1. Abelson, H., Beal, J., and Sussman, G. J. 2007. Amorphous computing. Tech. rep. MIT-CSAIL-TR-2007-030, Computer Science and Artificial Intelligence Laboratory, MIT, Cambridge, MA.Google ScholarGoogle Scholar
  2. Beal, J. 2003. Persistent nodes for reliable memory in geographically local networks. Tech. rep. AI Memo 2003-011, Artificial Intelligence Laboratory, MIT, Cambridge, MA.Google ScholarGoogle Scholar
  3. Borcea, C., Intanagonwiwat, C., Kang, P., Kremer, U., and Iftode, L. 2004. Spatial programming using smart messages: Design and implementation. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS’04). Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Butera, W. 2007. Text display and graphics control on a paintable computer. In Proceedings of the 1st International Conference on Self-Adaptive and Self-Organizing Systems (SASO’07). IEEE, Los Alamitos, CA, 45--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cheng, J., Cheng, W., and Nagpal, R. 2005. Robust and self-repairing formation control for swarms of mobile agents. In Proceedings of the 20th National Conference on Artificial Intelligence. AAAI Press, Menlo Park, CA, 59--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Corbet, D. J. and Cutting, D. 2006. Ad loc: Location-based infrastructure-free annotation. In Proceedings of the 3rd International Conference on Mobile Computing and Ubiquitous Networking (ICMU’06).Google ScholarGoogle Scholar
  7. Courts, L., Killijian, M.-O., Powell, D., and Roy, M. 2005. Sauvegarde cooprative entre pairs pour dispositifs mobiles. In Proceedings of the 2nd French-Speaking Conference on Mobility and Ubiquity Computing (UbiMob’05). ACM, New York, 97--104. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Datta, A., Quarteroni, S., and Aberer, K. 2004. Autonomous gossiping: A self-organizing epidemic algorithm for selective information dissemination in mobile ad-hoc networks. In Proceedings of the International Conference on Semantics of a Networked World (IC-SNW’04). Lecture Notes in Computer Science, vol. 3226, Springer, Berlin, 126--143.Google ScholarGoogle Scholar
  9. Di Marzo Serugendo, G., Villalba Castro, A., and Konstantas, D. 2007. Dependable requirements for hovering information. In Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’07). Supplemental vol., 36--39.Google ScholarGoogle Scholar
  10. Dolev, S., Gilbert, S., Lynch, N. A., Shvartsman, A. A., and Welch, J. 2003. Geoquorums: Implementing atomic memory in mobile ad hoc networks. In Distributed Computing, Lecture Notes in Computer Science, vol. 2848, Springer, Berlin, 306--320.Google ScholarGoogle Scholar
  11. Dolev, S., Gilbert, S., Lynch, N. A., Schiller, E., Shvartsman, A. A., and Welch, J. L. 2004. Virtual mobile nodes for mobile ad hoc networks. In Distributed Computing. Lecture Notes in Computer Science, vol. 3274, Springer, Berlin, 230--244.Google ScholarGoogle Scholar
  12. Dolev, S., Gilbert, S., Lahiani, L., Lynch, N. A., and Nolte, T. 2005a. Timed virtual stationary automata for mobile networks. In Principles of Distributed Systems (OPODIS). Lecture Notes in Computer Science, vol. 3974, Springer, Berlin, 130--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Dolev, S., Gilbert, S., Schiller, E., Shvartsman, A. A., and Welch, J. 2005b. Autonomous virtual mobile nodes. In Proceedings of the Joint Workshop on Foundations of Mobile Computing (DIALM-POMC’05). ACM, New York, 62--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Eugster, P., Felber, P., Guerraoui, R., and Kermarrec, A.-M. 2003. The many faces of publish/subscribe. ACM Comput. Surv. 35, 2, 114--131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Eugster, P., Garbinato, G., and Holzer, A. 2005. Location-based publish/subscribe. In Proceedings of the 4th IEEE Symposium on Network Computing and Applications. IEEE, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Eugster, P., Garbinato, G., Holzer, A., and Luo, J. 2009. Effective location-based publish/subscribe in manets. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’09). IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  17. Fekete, S. P., Schmidt, C., Wegener, A., and Fischer, S. 2006. Hovering data clouds for recognizing traffic jams. In Proceedings of the 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (IEEE-ISOLA). IEEE, Los Alamitos, CA, 213--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Fernandez-Marquez, J. L. and Arcos, J. L. 2009. Keeping diversity when exploring dynamic environments. In Proceedings of the 24th Annual ACM Symposium on Applied Computing. D. Shin Ed., ACM, New York, 1192--1196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Fernandez-Marquez, J. L., Arcos, J. L., and Di Marzo Serugendo, G. 2010. In Proceedings of the ACM Symposium on Applied Computing (SAC’10). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Fernandez-Marquez, J. L., Di Marzo Serugendo, G., and Arcos, J. L. 2010. Infrastructureless spatial storage algorithms. Tech. rep. BBKCS-10-05, School of Computer Science and Information Systems, Birkbeck, University of London.Google ScholarGoogle Scholar
  21. Killijian, M.-O., Powell, D., Bantre, M., Couderc, P., and Roudier, Y. 2004. Collaborative backup for dependable mobile applications. In Proceedings of the 2nd Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC’04). ACM, New York, 146--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Leontiadis, I. and Mascolo, C. 2007a. Geopps: Opportunistic geographical routing for vehicular networks. In Proceedings of the IEEE Workshop on Autonomic and Oportunistic Communications (Colocated with WOWMOM’07). IEEE, Los Alamitos, CA.Google ScholarGoogle Scholar
  23. Leontiadis, I. and Mascolo, C. 2007b. Opportunistic spatio-temporal dissemination system for vehicular networks. In Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking (MobiOpp’07). ACM, New York, 39--46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Leontiadis, I., Costa, P., and Mascolo, C. 2009. Persistent content-based information dissemination in hybrid vehicular networks. In Proceedings of the IEEE International Conference on Pervasive Computing and Communications (PerCom’09). IEEE, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Maihfer, C. 2004. A survey of geocast routing protocols. In IEEE Communications Surveys and Tutorials, Vol. 6, 32--42. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Mamei, M. and Zambonelli, F. 2001. Programming pervasive and mobile computing applications: The TOTA approach. ACM Trans. Softw. Eng. Method. 2, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Mamei, M. and Zambonelli, F. 2005. Programming stigmergic coordination with the tota middleware. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’05). ACM, New York, 415--422. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Motani, M., Srinivasan, V., and Nuggehalli, P. S. 2005. Peoplenet: Engineering a wireless virtual social network. In Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom’05). ACM, New York, 243--257. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Roth, J. 2003. The critical mass problem of mobile ad-hoc networks. In Proceedings of the IADIS International Conference e-Society. IADIS Press, 243--250.Google ScholarGoogle Scholar
  30. Scellato, S., Mascolo, C., Musolesi, M., and Latora, V. 2007. Epcast: Controlled dissemination in human-based wireless networks by means of epidemic spreading models. CoRR abs/0711.2780.Google ScholarGoogle Scholar
  31. Villalba Castro, A., Di Marzo Serugendo, G., and Konstantas, D. 2008. Hovering information--self-organising information that finds its own storage. In Proceedings of the International IEEE Conference on Sensor Networks, Ubiquitous and Trustworthy Computing (SUTC’08). IEEE, Los Alamitos, CA, 193--200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Villalba Castro, A., Di Marzo Serugendo, G., and Konstantas, D. 2009. Hovering information--self-organising information that finds its own storage. In Autonomic Communications. Springer, Berlin.Google ScholarGoogle Scholar
  33. Wegener, A., Schiller, E.M., Hellbrck, H., Fekete, S.P., and Fischer, S. 2006. Hovering data clouds: A decentralized and self-organizing information system. In Proceedings of the International Workshop on Self-Organizing Systems. Lecture Notes in Computer Science, vol. 4124, Springer, Berlin, 243--247. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Infrastructureless Spatial Storage Algorithms

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!