Data replication techniques in the mobile ad hoc networks

2019 ◽  
Vol 15 (3/4) ◽  
pp. 174-198
Author(s):  
A. Abdollahi Nami ◽  
L. Rajabion

Purpose A mobile ad hoc network (MANET) enables providers and customers to communicate without a fixed infrastructure. Databases are extended on MANETs to have easy data access and update. As the energy and mobility limitations of both servers and clients affect the availability of data in MANETs, these data are replicated. The purpose of this paper is to provide a literature review of data replication issues and classify the available strategies based on the issues they addressed. Design/methodology/approach The selected articles are reviewed based on the defined criteria. Also, the differences, the advantages and disadvantages of these techniques are described. The methods in the literature can be categorized into three groups, including cluster-based, location-based and group-based mechanisms. Findings High flexibility and data consistency are the features of cluster-based mechanisms. The location-based mechanisms are also appropriate for replica allocation, and they mostly have low network traffic and delay. Also, the group-based mechanism has high data accessibility compared to other mechanisms. Data accessibility and time have got more attention to data replication techniques. Scalability as an important parameter must be considered more in the future. The reduction of storage cost in MANETs is the main goal of data replication. Researchers have to consider the cost parameter when another parameter will be influenced. Research limitations/implications Data replication in MANETs has been covered in different available sources such as Web pages, technical reports, academic publications and editorial notes. The articles published in national journals and conferences are ignored in this study. This study includes articles from academic main international journals to get the best capability. Originality/value The paper reviews the past and the state-of-the-art mechanisms in data replication in MANET. Exclusively, data replication’s main goal, existing challenges, research terminologies and mechanisms in MANET are summarized using the answers to the research questions. This method will help researchers in the future to develop more effective data replication method in MANET.

2006 ◽  
Vol 2 (4) ◽  
pp. 193-209 ◽  
Author(s):  
Mieso K. Denko ◽  
Hua Lu

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes that forms a temporary network without the aid of a fixed communication infrastructure. Since every node can be mobile and network topology changes can occur frequently, node disconnection is a common mode of operation in MANETs. Providing reliable data access and message delivery is a challenge in this dynamic network environment. Caching and replica allocation within the network can improve data accessibility by storing the data and accessing them locally. However, maintaining data consistency among replicas becomes a challenging problem. Hence, balancing data accessibility and consistency is an important step toward data management in MANETs. In this paper, we propose a replica-based data-storage mechanism and undelivered-message queue schemes to provide reliable data storage and dissemination. We also propose replica update strategies to maintain data consistency while improving data accessibility. These solutions are based on a clustered MANET where nodes in the network are divided into small groups that are suitable for localized data management. The goal is to reduce communication overhead, support localized computation, and enhance scalability. A simulation environment was built using an NS-2 network simulator to evaluate the performance of the proposed schemes. The results show that our schemes distribute replicas effectively, provide high data accessibility rates and maintain consistency.


2006 ◽  
Vol 07 (01) ◽  
pp. 75-89 ◽  
Author(s):  
TAKAHIRO HARA

To improve data accessibility in ad hoc networks, we have proposed a few methods of replicating data items on mobile hosts by considering the data access frequencies from mobile hosts to each data item and the network topology. In this paper, we address techniques to manage locations of data items or replicas and efficiently forward access requests to the locations. In order to manage locations of data items efficiently, a key issues is predicting the locations of data items that dynamically change. To predict the locations of data items, we use the information on replica allocation at every relocation time and the logs of past data accesses.


2020 ◽  
Vol 26 (8) ◽  
pp. 1345-1361 ◽  
Author(s):  
Yee Ling Yap ◽  
Swee Leong Sing ◽  
Wai Yee Yeong

Purpose Soft robotics is currently a rapidly growing new field of robotics whereby the robots are fundamentally soft and elastically deformable. Fabrication of soft robots is currently challenging and highly time- and labor-intensive. Recent advancements in three-dimensional (3D) printing of soft materials and multi-materials have become the key to enable direct manufacturing of soft robots with sophisticated designs and functions. Hence, this paper aims to review the current 3D printing processes and materials for soft robotics applications, as well as the potentials of 3D printing technologies on 3D printed soft robotics. Design/methodology/approach The paper reviews the polymer 3D printing techniques and materials that have been used for the development of soft robotics. Current challenges to adopting 3D printing for soft robotics are also discussed. Next, the potentials of 3D printing technologies and the future outlooks of 3D printed soft robotics are presented. Findings This paper reviews five different 3D printing techniques and commonly used materials. The advantages and disadvantages of each technique for the soft robotic application are evaluated. The typical designs and geometries used by each technique are also summarized. There is an increasing trend of printing shape memory polymers, as well as multiple materials simultaneously using direct ink writing and material jetting techniques to produce robotics with varying stiffness values that range from intrinsically soft and highly compliant to rigid polymers. Although the recent work is done is still limited to experimentation and prototyping of 3D printed soft robotics, additive manufacturing could ultimately be used for the end-use and production of soft robotics. Originality/value The paper provides the current trend of how 3D printing techniques and materials are used particularly in the soft robotics application. The potentials of 3D printing technology on the soft robotic applications and the future outlooks of 3D printed soft robotics are also presented.


Cloud computing technology has gained substantial research interest, due to its remarkable range of services. The major concerns of cloud computing are availability and security. Several security algorithms are presented in the literature for achieving better security and the data availability is increased by utilizing data replicas. However, creation of replicas for all the data is unnecessary and consumes more storage space. Considering this issue, this article presents a Secure Data Replication Management Scheme (SDRMS), which creates replicas by considering the access frequency of the data and the replicas are loaded onto the cloud server by considering the current load of it. This idea balances the load of the cloud server. All the replicas are organized in a tree like structure and the replicas with maximum hit ratio are placed on the first level of the tree to ensure better data accessibility. The performance of the work is satisfactory in terms of data accessibility, storage exploitation, replica allocation and retrieval time.


2015 ◽  
Vol 37 ◽  
pp. 399
Author(s):  
Sogand Sahabi Moghaddam ◽  
Abbas Karimi

Multicast data replication provides a possible solution for improving data accessibility in highly dynamic and fault prone mobile ad hoc environments. Our novel multicast data replication approach operates in a self-organizing manner where the network nodes that has unit host detector construct a connected dominating set (CDS) based on the topology graph by collecting information from neighboring nodes using multicast if gathered data from neighbors have two non-adjacent neighbors then use that virtual backbone for efficient data replication, data search and routing. In this study, we compare our proposed approach with SCALAR and evaluate it in average hop counts and successful delivery ratio with different node numbers and speeds.It is shown that the average hop counts increased but with falling rate and 20 percent successful delivery ratio is achieved, so it is demonstrated that PM act with respect to fault tolerance improvement, power consumption and load balancing is occurred.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Xianke Sun ◽  
Gaoliang Wang ◽  
Liuyang Xu ◽  
Honglei Yuan

PurposeIn data grids, replication has been regarded as a crucial optimization strategy. Computing tasks are performed on IoT gateways at the cloud edges to obtain a prompt response. So, investigating the data replication mechanisms in the IoT is necessary. Henceforth, a systematic survey of data replication strategies in IoT techniques is presented in this paper, and some suggestions are offered for the upcoming works. In two key classifications, various parameters dependent on the analysis of the prevalent approaches are considered. The pros and cons associated with chosen strategies have been explored, and the essential problems of them have been presented to boost the future of more effective data replication strategies. We have also discovered gaps in papers and provided solutions for them.Design/methodology/approachProgress in Information Technology (IT) growth has brought the Internet of Things (IoT) into life to take a vital role in our everyday lifestyles. Big IoT-generated data brings tremendous data processing challenges. One of the most challenging problems is data replication to improve fault-tolerance, reliability, and accessibility. In this way, if the primary data source fails, a replica can be swapped in immediately. There is a significant influence on the IoT created by data replication techniques, but no extensive and systematic research exists in this area. There is still no systematic and full way to address the relevant methods and evaluate them. Hence, in the present investigation, a literature review is indicated on the IoT-based data replication from papers published until 2021. Based on the given guidelines, chosen papers are reviewed. After establishing exclusion and inclusion criteria, an independent systematic search in Google Scholar, ACM, Scopus, Eric, Science Direct, Springer link, Emerald, Global ProQuest, and IEEE for relevant studies has been performed, and 21(6 paper analyzed in section 1 and 15 paper analyzed in section 3) papers have been analyzed.FindingsThe results showed that data replication mechanisms in the IoT algorithms outperform other algorithms regarding impressive network utilization, job implementation time, hit ratio, total replication number, and the portion of utilized storage in percentage. Although a few ideas have been suggested that fix different facets of IoT data management, we predict that there is still space for development and more study. Thus, in order to design innovative and more effective methods for future IoT-based structures, we explored open research directions in the domain of efficient data processing.Research limitations/implicationsThe present investigation encountered some drawbacks. First of all, only certain papers published in English were included. It is evident that some papers exist on data replication processes in the IoT written in other languages, but they were not included in our research. Next, the current report has only analyzed the mined based on data replication processes and IoT keyword discovery. The methods for data replication in the IoT would not be printed with keywords specified. In this review, the papers presented in national conferences and journals are neglected. In order to achieve the highest ability, this analysis contains papers from major global academic journals.Practical implicationsTo appreciate the significance and accuracy of the data often produced by different entities, the article illustrates that data provenance is essential. The results contribute to providing strong suggestions for future IoT studies. To be able to view the data, administrators have to modify novel abilities. The current analysis will deal with the speed of publications and suggest the findings of research and experience as a future path for IoT data replication decision-makers.Social implicationsIn general, the rise in the knowledge degree of scientists, academics, and managers will enhance administrators' positive and consciously behavioral actions in handling IoT environments. We anticipate that the consequences of the present report could lead investigators to produce more efficient data replication methods in IoT regarding the data type and data volume.Originality/valueThis report provides a detailed literature review on data replication strategies relying on IoT. The lack of such papers increases the importance of this paper. Utilizing the responses to the study queries, data replication's primary purpose, current problems, study concepts, and processes in IoT are summarized exclusively. This approach will allow investigators to establish a more reliable IoT technique for data replication in the future. To the best of our understanding, our research is the first to provide a thorough overview and evaluation of the current solutions by categorizing them into static/dynamic replication and distributed replication subcategories. By outlining possible future study paths, we conclude the article.


2015 ◽  
Vol 1 (3) ◽  
pp. 223-239 ◽  
Author(s):  
Brielle Gillovic ◽  
Alison McIntosh

Purpose The purpose of this paper is to put forward the argument that New Zealand’s tourism industry generally fails to acknowledge the importance of the access market. Despite anecdotal evidence of the market’s value and strong legislation, New Zealand’s access market arguably remains underserviced and misunderstood. The current research sought to explore social and business rationales to support a future for accessible tourism in New Zealand, from the perspectives of its key stakeholders. It sought to uncover contemporary issues in the tourism industry, to examine the capacity and context for which issues can be addressed and overcome, to achieve a future for accessible tourism in New Zealand. Design/methodology/approach Under the interpretive paradigm, original, exploratory research was conducted. Semi-structured interviews were carried out with ten key New Zealand tourism industry stakeholders who agreed to participate in the research. Qualitative data were thematically analysed. The following five key themes inductively emerged from the data: “Accessibility as a human right: Developing a culture of accessibility”; “Accessible tourism: Good for business?”; “Bottom-up, market-led approach”; “Leadership from the top: Moving from apathy to action”; and “Meeting somewhere in the middle”. The five themes correspond to themes evidenced in the wider literature and present propositions for the future development of accessible tourism in New Zealand. Findings Findings revealed stakeholder opinions of an industry exemplifying minimal awareness and consideration for accessibility. Accessibility was perceived to be an issue of social change, requiring the achievement of a cultural shift where accessibility is envisioned as a cultural norm necessary for the future. Whilst top-down leadership and support were deemed pertinent, ownership and accountability were seen to be crucial at the lower, operational levels of the industry. A “meeting in the middle” was reported necessary to see the leveraging of a greater push towards accessibility and emphasising more prominently, what has been and can be done, moving forward into the future. Originality/value This paper provides original insights into the current and future scope of accessible tourism in New Zealand from the perspectives of its stakeholders. The key themes derived from the research assist knowledge for aligning the industry on a pathway towards achieving the necessary awareness and collaboration required in order to offer accessible tourism experiences to all.


2018 ◽  
Vol 17 (2) ◽  
pp. 309-334 ◽  
Author(s):  
Millicent McCreath ◽  
Zoe Scanlon

Abstract The maritime boundary delimitation decision in the Ghana/Côte d’Ivoire Case is remarkable as the first decision of an ad hoc chamber of the International Tribunal for the Law of the Sea (ITLOS). This article evaluates the advantages of this critically under-examined dispute settlement mechanism, its operation in this case and the consequent prospects for the future use of such chambers. To date, the ad hoc chambers of both ITLOS and the International Court of Justice (ICJ) have rarely been used. Examining their respective procedures, legal frameworks, and performance, this article evaluates the comparative advantages and disadvantages of ITLOS ad hoc chambers vis-à-vis both ad hoc arbitration and the full bench of ITLOS. Although limited conclusions on the prospects for the mechanism’s future use can be drawn from this single decision, in light of the broadly positive outcome, prospective parties may be drawn to the possibilities and potential advantages of the ITLOS ad hoc chamber mechanism in the future.


Sign in / Sign up

Export Citation Format

Share Document