Application-Controlled Loss-Tolerant Data Dissemination
نویسندگان
چکیده
Reactive or proactive mobile applications require continuous monitoring of their physical and computational environment to make appropriate decisions in time. These applications need to monitor data streams produced by sensors and react to changes. When mobile sensors and applications are connected by low-bandwidth wireless networks, sensor data rates may overwhelm the capacity of network links or of the applications. In traditional networks and distributed systems, flow-control and congestion-control policies either drop data or force the sender to pause. When the data sender is sensing the physical environment, however, a pause is equivalent to dropping data. Arbitrary data drops are not necessarily acceptable to the reactive mobile applications receiving sensor data. Data distribution systems must support applicationspecific policies that selectively drop data objects when network or application buffers overflow. In this paper we present a data-dissemination service, PACK, which allows applications to specify customized data-reduction policies. These policies define how to discard or summarize data flows wherever buffers overflow on the dissemination path, notably at the mobile hosts where applications often reside. The PACK service provides an overlay infrastructure to support mobile data sources and sinks, using application-specific datareduction policies where necessary along the data path. We uniformly apply the data-stream “packing” abstraction to buffer overflow caused by network congestion, slow receivers, and the temporary disconnections caused by end-host mobility. We demonstrate the effectiveness of our approach with an application example and experimental measurements.
منابع مشابه
Data Dissemination And Information Diffusion In Social Networks
Data dissemination problem is a challenging issue in social networks, especially in mobile social networks, which grows rapidly in recent years worldwide with a significant increasing number of hand-on mobile devices such as smart phones and pads. Short-range radio communications equipped in mobile devices enable mobile users to access their interested contents not only from access points of In...
متن کاملGeo-Social Mobility Model for VANET Simulation
Vehicular Ad Hoc Network (VANET) is a special case of opportunistic network where nodes are moving vehicles communicating together through short range wireless transmission. VANET applications vary from safety and accident avoidance to leisure and entertainment. The data dissemination routine differs according to the delay tolerance of the application. The bandwidth usage of the application is ...
متن کاملSecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Peer-to-peer (P2P) dissemination systems are vulnerable to attacks that may impede nodes from receiving data in which they are interested. The same properties that lead P2P systems to be scalable and efficient also lead to security problems and lack of guarantees. Within this context, live-streaming protocols deserve special attention since their time sensitive nature makes them more susceptibl...
متن کاملA survey of routing and data dissemination in Delay Tolerant Networks
Delay Tolerant Networks (DTNs) have practical applications in various fields. DTNs have been studied in-depth by many researchers and multiple high quality survey papers have been produced which analyzes DTN features, taxonomies, and applications. In recent years, interest in DTN research has rekindled as there are several emerging network-based application domains that require delay tolerance ...
متن کاملSecurity Architectures for Controlled Digital Information Dissemination
Besides securing transmission of digital information at lower layers, several application-level security solutions for controlled dissemination of digital information have been developed using cryptographic, watermarking or use-control technologies. These dissemination control solutions have been designed for different business purposes. Little research, if any, identifies security architecture...
متن کامل