Mill: A Geographical Location Oriented Overlay Network Managing Data of Ubiquitous Sensors
نویسندگان
چکیده
With the rapid rise in the demand for location related service, communication devices such as PDAs or cellar phones must be able to search and manage information related to the geographical location. To leverage location-related information is useful to get an in-depth perspective on environmental circumstances, such as traffic conditions or weather information. To handle the large number of information and queries communication devices generate in the current ubiquitous environment, some scalable mechanism must be required. DHTs and some overlay networks supporting range search are proposed. However, these overlay networks can not process queries of geographical region search. In this paper, we propose a overlay network called “Mill” which can efficiently manage information related to the geographical location. In DHT based overlay networks, each node has responsibility to manage a part of the whole hash table. DHTs provide scalable systems and support fast search. However, DHTs are not good at solving geographical search (range search), because hash function only supports exact match. In the Mill network, each node manages a part of ID-space calculated by “Z-ordering,” which represents squire surface of the earth. This structure of ID-space enables to process region queries easily and fast. And Mill supports any scale of region search. We evaluate proposed system by using traffic infomation generator called “HAKONIWA.” Simulation results show that the performance of Mill is good as well as other DHT systems. In addtion, Mill provedes more efficient region search than other overlay networks supporting range search. key words: structured peer-to-peer system, geographical based overlay networks
منابع مشابه
TAC: A Topology-Aware Chord-based Peer-to-Peer Network
Among structured Peer-to-Peer systems, Chord has a general popularity due to its salient features like simplicity, high scalability, small path length with respect to network size, and flexibility on node join and departure. However, Chord doesn’t take into account the topology of underlying physical network when a new node is being added to the system, thus resulting in high routing late...
متن کاملExploration of Ubiquitous Computing and its Applications in Various Arenas
Ubiquitous Computing is all about how people can interact with heterogeneous devices such as computer, mobile, Personal Digital Assistants (PDAs), tabs, small sensors without explicitly instructing these gadgets and few of such gadgets are invisible to the user. Ubiquitous computing is all about to make a computer so implanted, so appropriate and so natural which fulfil every requirement of the...
متن کاملAn Adaptive Context Aware Communication System for Ubiquitous Environment based on Overlay Network
As more and more people living by their own, the importance to remote monitoring is becoming essential for looking after them. But protecting personal privacy is going to be a prime concern as patient’s data should be available irrespective of their location, but only to the authorized person. We need to consider the social relationship between the monitored person and those who are responsible...
متن کاملSupernode-BasedMultiring P2P Middleware for the Global Contentifier
As peer-to-peer applications are becoming ubiquitous for content distribution and communication, modern artists reflect on and incorporate P2P technologies in their work. The novel Global Contentifier installation art project uses P2P technology to drive an interactive audio sculpture interconnecting users and enabling the exchange of personal wishes of political concern, while visualising the ...
متن کاملMobile Object Location Discovery in Unpredictable Environments
Emerging mobile and ubiquitous computing environments present hard challenges to software engineering. The use of mobile code has been suggested as a natural fit for simplifying software development for these environments. Existing strategies for locating mobile code assume an underlying fixed, stable network. An alternative approach is required for mobile environments, where network size and r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 90-B شماره
صفحات -
تاریخ انتشار 2007