Data-Centric Query in Sensor Networks

Similar documents
Lecture 5: Data Query in Networks. Rik Sarkar. Rik Sarkar. FU Berlin. Winter '11-'12.

Information Brokerage

Information Brokerage

ROUTING ALGORITHMS Part 1: Data centric and hierarchical protocols

Rumor Routing Algorithm

Data-Centric Routing Mechanism Using Hash-Value in Wireless Sensor Network

Location-aware In-Network Monitoring in Wireless Sensor Networks

Routing and Transport in Wireless Sensor Networks

ROUTING ALGORITHMS Part 2: Data centric and hierarchical protocols

Energy-Efficient Communication Protocol for Wireless Micro-sensor Networks

References. Introduction. Publish/Subscribe paradigm. In a wireless sensor network, a node is often interested in some information, but

Location Services. Otmar Caduff

Distributed Indexing and Data Dissemination in Large Scale Wireless Sensor Networks

Simulations of the quadrilateral-based localization

Distributed Hash Table

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Zonal Rumor Routing for. Wireless Sensor Networks

Cut Graph Based Information Storage and Retrieval in 3D Sensor Networks with General Topology

Evaluation of Cartesian-based Routing Metrics for Wireless Sensor Networks

Rumor Routing Algorithm For Sensor Networks.

Artery: A Data-Centric Architecture for Wireless Sensor Networks

Geographic Routing in Simulation: GPSR

WSN Routing Protocols

Geographical routing 1

EBRP: Energy Band based Routing Protocol for Wireless Sensor Networks

GHT: A Geographic Hash Table for Data-Centric Storage

The Research of Data Storage and Retrieval Scheme for Wireless Sensor Networks

Efficient Peer-to-Peer Information Sharing over Mobile Ad Hoc Networks

A Scalable Content- Addressable Network

Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table

A Scalable Location Service for Geographic Ad Hoc Routing. Jinyang Li

Mobility of sink using hexagon architecture in highly data centric Wireless Sensor Networks

Event Driven Routing Protocols For Wireless Sensor Networks

Zone Sharing: A Hot-Spots Decomposition Scheme for Data-Centric Storage in Sensor Networks

Routing in Sensor Networks

Challenges in Geographic Routing: Sparse Networks, Obstacles, and Traffic Provisioning

Distributed Fine-Grained Node Localization in Ad-Hoc Networks. A Scalable Location Service for Geographic Ad Hoc Routing. Presented by An Nguyen

Routing in Ad-Hoc Networks

Data Dissemination with Ring-Based Index for Sensor Networks

FERMA: An Efficient Geocasting Protocol for Wireless Sensor Networks with Multiple Target Regions

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Delay Tolerant Networks

An efficient implementation of the greedy forwarding strategy

[Kleinberg04] J. Kleinberg, A. Slivkins, T. Wexler. Triangulation and Embedding using Small Sets of Beacons. Proc. 45th IEEE Symposium on Foundations

Geographic Routing Without Location Information. AP, Sylvia, Ion, Scott and Christos

BGR: Blind Geographic Routing for Sensor Networks

Data Centric Routing Protocols in Wireless Sensor Networks: A Survey

Networking Sensors, II

Analyzing the Performance of Data Dissemination Algorithms to Application Requirements in Wireless Sensor Network

Study on Wireless Sensor Networks Challenges and Routing Protocols

AEC Algorithm for WSN Lifetime Enhancement

Optimizing Data Replication for Expanding Ring-based Queries in Wireless Sensor Networks

Application-Specific Modelling of Information Routing in Wireless Sensor Networks

Landmark-based routing

Distributed Contextual Information Storage using Content-Centric Hash Tables

The Firecracker Protocol

Energy-efficient Data Dissemination in Wireless Sensor Networks

Geographic Adaptive Fidelity and Geographic Energy Aware Routing in Ad Hoc Routing

Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures

Clustering Routing Protocol Based on Location Node in Wireless Sensor Networks

Searching for Shared Resources: DHT in General

Architectures for Distributed Systems

Outline. Motivation. Traditional Database Systems. A Distributed Indexing Scheme for Multi-dimensional Range Queries in Sensor Networks

Searching for Shared Resources: DHT in General

Scalability In Peer-to-Peer Systems. Presented by Stavros Nikolaou

ENERGY SAVING IN WIRELESS SENSOR NETWORK WITH SPIN PROTOCOL

Approximately Uniform Random Sampling in Sensor Networks

Overview of Sensor Network Routing Protocols. WeeSan Lee 11/1/04

A Chord-Based Novel Mobile Peer-to-Peer File Sharing Protocol

Flooded Queries (Gnutella) Centralized Lookup (Napster) Routed Queries (Freenet, Chord, etc.) Overview N 2 N 1 N 3 N 4 N 8 N 9 N N 7 N 6 N 9

Distributed Systems. Ad hoc and sensor networks. Rik Sarkar. University of Edinburgh Fall 2018

Comparison of TDMA based Routing Protocols for Wireless Sensor Networks-A Survey

An Energy-aware Greedy Perimeter Stateless Routing Protocol for Mobile Ad hoc Networks

Early Measurements of a Cluster-based Architecture for P2P Systems

SLALoM: A Scalable Location Management Scheme for Large Mobile Ad-hoc Networks

R2D2: Rendezvous Regions for Data Discovery Karim Seada 1, Ahmed Helmy 2

A Framework for Peer-To-Peer Lookup Services based on k-ary search

The Energy-Robustness Tradeoff for Routing in Wireless Sensor Networks

Data Centric Storage Technologies: Analysis and Enhancement

Building a low-latency, proximity-aware DHT-based P2P network

A Hybrid Peer-to-Peer Architecture for Global Geospatial Web Service Discovery

The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

A Geography-free Routing Protocol for Wireless Sensor Networks Yunhuai Liu 1, Lionel M. Ni 1 and Minglu Li 2

Keyword- Geographically Routing Protocol, MANET Routing Protocol, Wireless Sensor Network, Position Based Routing Protocol..

MLS An Efficient Location Service for Mobile Ad Hoc Networks Roland Flury Roger Wattenhofer

CS 229 Final Report: Location Based Adaptive Routing Protocol(LBAR) using Reinforcement Learning

Supporting Group Communication among Interacting Agents in Wireless Sensor Networks

Receiver Based Multicasting Protocol for Wireless Sensor Networks

Mobile agent based event discovery in wireless sensor networks

CACHING IN WIRELESS SENSOR NETWORKS BASED ON GRIDS

EFFICIENT ROUTING OF LOAD BALANCING IN GRID COMPUTING

Load Sharing in Peer-to-Peer Networks using Dynamic Replication

Performance Comparison of Scalable Location Services for Geographic Ad Hoc Routing

A Simple Sink Mobility Support Algorithm for Routing Protocols in Wireless Sensor Networks

Hybrid Push-Pull Query Processing for Sensor Networks. Niki Trigoni, Yong Yao, Alan Demers, Johannes Gehrke

2 Proposed Routing Protocol

Ad hoc and Sensor Networks Topology control

Adaptive Distributed Indexing for Spatial Queries in Sensor Networks

Making Gnutella-like P2P Systems Scalable

Transcription:

Data-Centric Query in Sensor Networks Jie Gao Computer Science Department Stony Brook University 10/27/05 Jie Gao, CSE590-fall05 1

Papers Chalermek Intanagonwiwat, Ramesh Govindan and Deborah Estrin, Directed diffusion: A scalable and robust communication paradigm for sensor networks, In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom '00), August 2000, Boston, Massachusetts. David Braginsky and Deborah Estrin, Rumor Routing Algorithm For Sensor Networks, Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, 2001. Sylvia Ratnasamy, Li Yin, Fang Yu, Deborah Estrin, Ramesh Govindan, Brad Karp, Scott Shenker, GHT: A Geographic Hash Table for Data-Centric Storage, In First ACM International Workshop on Wireless Sensor Networks and Applications (WSNA) 2002. Jinyang Li, John Jannotti, Douglas S. J. De Couto, David R. Karger and Robert Morris, A scalable location service for geographic ad hoc routing, MobiCom'00. 10/27/05 Jie Gao, CSE590-fall05 2

Scenario I: tourists and animals A sensor network in a zoo. A tourist asks: where is the elephant (or giraffe, or zebra)? So which sensor has the data about the elephant (or giraffe, or zebra)? 10/27/05 Jie Gao, CSE590-fall05 3

Scenario II: location service A missing part of geographical routing and many routing algorithms based on virtual coordinates: how does the source know the location (or virtual coordinates) of the destination? Location service: a brokerage service that answers queries such as: where is the node with ID 23? Geographical routing: The source asks for the location of destination; The source routes by using geographical routing. Notice: chicken and egg problem. 10/27/05 Jie Gao, CSE590-fall05 4

Data-centric Traditional networks: routing is based on network ID (e.g., IP addresses). Communication abstractions are based on data rather than node network addresses. Data-centric routing Route to the node with the data the user wants. Data-centric storage Store all the data with the general name (elephant) at the same node. 10/27/05 Jie Gao, CSE590-fall05 5

Abstraction of data-centric routing Information producer/consumer game. information producer. Can be anywhere in the network. Dynamic, mobile. Multiple producers generating data about the same entry. Users = information consumer. Can be anywhere in the network. Concurrent multiple consumers. 10/27/05 Jie Gao, CSE590-fall05 6

Directed Diffusion 10/27/05 Jie Gao, CSE590-fall05 7

Interest and data Data is named by attribute-value pairs. Query is represented by interest. 10/27/05 Jie Gao, CSE590-fall05 8

Interest dissemination A sensing task is disseminated in the network as an interest for named data. Interest is refreshed for robustness. 10/27/05 Jie Gao, CSE590-fall05 9

Gradient establishment Each node caches a gradient for interest: which specifies the data rate and duration. 10/27/05 Jie Gao, CSE590-fall05 10

Data transmission Data is transmitted back to sink. The path is reinforced. 10/27/05 Jie Gao, CSE590-fall05 11

Variations Data rate is set low at the beginning. When gradient is established, data rate is increased. 10/27/05 Jie Gao, CSE590-fall05 12

Flooding is expensive. Use more efficient methods for consumer to find producer? The next Rumor routing 10/27/05 Jie Gao, CSE590-fall05 13

Alternative Methods Query flooding Expensive for high query/event ratio Allows for optimal reverse path setup Gossiping scheme can be use to reduce overhead Event Flooding Expensive for low query/event ratio Set up an information gradient to guide query routing. Note : Both of them provide shortest delay paths 10/27/05 Jie Gao, CSE590-fall05 14

Tradeoff 10/27/05 Jie Gao, CSE590-fall05 15

Rumor Routing Designed for query/event ratios between query and event flooding Motivation Sometimes a non-optimal route is satisfactory Advantages Tunable best effort delivery Tunable for a range of query/event ratios Disadvantages Optimal parameters depend heavily on topology (but can be adaptively tuned) Does not guarantee delivery 10/27/05 Jie Gao, CSE590-fall05 16

A geometric observation Inside a circle, draw two random lines, what is the probability that they intersect? 1 0 x(1 x) 2dx = 1 3 x 1-x 10/27/05 Jie Gao, CSE590-fall05 17

A geometric observation Inside a circle, draw k random lines, what is the probability that another random line intersects at least one of the k lines? Pr( k) 1 2 = 1 1 = 1 3 3 k k Pr(5)= 87% Pr(10)= 98%. Pr(logn)=1-O(1/n). 10/27/05 Jie Gao, CSE590-fall05 18

Algorithm Basics All nodes maintain a neighbor list. Nodes also maintain a event table When it observes an event, the event is added with distance 0. Agents Packets that carry local event info across the network. Aggregate events as they go. Agents do a random walk: among the 1-hop neighbors, find one that is not visited recently. 10/27/05 Jie Gao, CSE590-fall05 19

Examples 10/27/05 Jie Gao, CSE590-fall05 20

Simulation results N=3000-5000, randomly in 200 by 200 field, communication radius is 5. diameter of the network is roughly 40. A: # agents, La=agent TTL, Lq=query TTL. A large TTL for agents and query 10/27/05 Jie Gao, CSE590-fall05 21

Some thought about simulation results Random walk is not necessarily straight. Random walk on a graph: move to a neighbor with probability 1/d, where d is the degree. Hitting time H(i, j): expected number of steps to reach j if we start from node i. Suppose the source is i, sink is j, then the total number of hops of the two random walk before they intersect = H(i, j) approximately. i j 10/27/05 Jie Gao, CSE590-fall05 22

Some thought about simulation results For general graph the hitting time is Θ(n 3 ). For complete graph the hitting time is O(n). The maximum hitting time between any two nodes is at least half of the expected number of steps before a random walk visits half of the nodes. So there are two nodes such that a random walk between them visits about Ω(n) nodes. i j Random walk on graphs, a survey, by Lovasz. 10/27/05 Jie Gao, CSE590-fall05 23

Challenge For Bob and Alice to find each other, with nobody knowing where the other person is. What do they have in common? The same data One provides; One desires. Use the common data to setup a consensus on where to store/find it. 10/27/05 Jie Gao, CSE590-fall05 24

Distributed Hash Table (DHT) 10/27/05 Jie Gao, CSE590-fall05 25

Distributed hash table (DHT) For Bob and Alice to find each other. Lost and found. Basic idea: data-dependent reservoir. Use a content-based hash function h(elephant)=sensor #10. All the sensors with elephants info send to #10. All the tourists interested in elephants go to #10 to fetch the information. 10/27/05 Jie Gao, CSE590-fall05 26

Distributed hash table (DHT) Originally proposed for Peer-to-Peer routing on the Internet. E.g, Chord, Pastry, Tapastry, etc. A data object is given a key. Each node saves a set of keys. A routing algorithm allows any node to locate the one with an arbitrary key. 10/27/05 Jie Gao, CSE590-fall05 27

Geographical hash table (GHT) Assume nodes know their locations and do GPSR. The content-based hash function outputs a geographical location: h(elephant) = (14, 22). Use GPSR for information producers/consumers to route to the reservoir. h(elephant) 10/27/05 Jie Gao, CSE590-fall05 28

Geographical hash table (GHT) The content-based hash function h(elephant) = a geographical location (14, 22). Use geographical routing for information producers/consumers to route to the reservoir. Two questions: What if there is no sensor at location (14, 22)? What if geographical routing gets stuck? 10/27/05 Jie Gao, CSE590-fall05 29

Geographical hash table (GHT) We route to location L=(14, 22) and GPSR finds out there is no way to (14, 22) by touring along a perimeter of a face and get back to where it started. Home node: the one that is geographically closest to L. Home perimeter: the perimeter that GPSR tours around. 10/27/05 Jie Gao, CSE590-fall05 30

Geographical hash table (GHT) We replicate elephant information on all the nodes on the perimeter. The query follows the same home perimeter and retrieve the message. Home node: the one that is geographically closest to L. Home perimeter: the perimeter that GPSR tours around. 10/27/05 Jie Gao, CSE590-fall05 31

GHT: maintenance Home node periodically refresh replication by sending a packet to the hashed location L. If the timer of the replica times out, then a replica node initiates a refresh. 10/27/05 Jie Gao, CSE590-fall05 32

Geographical hash table (GHT) Advantages: simple. load balancing. Disadvantages: Not locality-sensitive. Consumer may travel far to fetch data even if the producer is close. Fault tolerance? Overload nodes on the boundary. 10/27/05 Jie Gao, CSE590-fall05 33

Hierarchical Hashing: a distributed location service 10/27/05 Jie Gao, CSE590-fall05 34

Distributed location service Geographical routing requires obtaining the location of the destination. What if the sensors move? How to update the location information? Location service: a distributed service that maps IDs to locations and answers the location query for any node. 10/27/05 Jie Gao, CSE590-fall05 35

Grid location service: design principle No node should be a bottleneck. Failure of a node should not affect the reachability of many other nodes. Queries of nearby hosts should be answered with correspondingly local communication. Per-node storage and communication cost should grow moderately slow. Every node serve as location servers for some other nodes. No hierarchy, since the node on top of the hierarchy tends to be overloaded. 10/27/05 Jie Gao, CSE590-fall05 36

Grid location service Each node is assigned a random ID: computed by a strong hash function on physical name, e.g., MAC address. Each node stores/updates its location information at a set of location servers, more at nearby regions, fewer at far away regions. Location query uses nothing beyond the ID. 10/27/05 Jie Gao, CSE590-fall05 37

Recursive partitioning Quad-tree partition: each node is inside a unique square on each level. Order 1 square Order 2 square Order 3 square 10/27/05 Jie Gao, CSE590-fall05 38 Order 4 square

Location servers Node B s location servers: Inside each sibling square on each level, choose the node with least ID greater than B. ID space is circular: 2 is closer to 17 than 7 is. We ll explain how to construct this later. 10/27/05 Jie Gao, CSE590-fall05 39

Location queries A queries the location of B: A s only information about B is the ID of B. A does not know who are B s location servers. B even doesn t know its location servers. How to implement location query? 10/27/05 Jie Gao, CSE590-fall05 40

Location queries A queries location of B: A stores location information for some other nodes. A send the request to the one that is closest to B, among those about which A has location information. Continue until hit one of B s location servers. This works! Why? 10/27/05 Jie Gao, CSE590-fall05 41

Location queries Claim: the query visits the node closest to B in A s order-i square. The query always goes to B s closest node, as the covering scope increases. The correctness of the alg: when A s order-i square contains B, the closest node is B itself. Proof by induction. It s obvious for order-0 and order-1 square. 10/27/05 Jie Gao, CSE590-fall05 42

Location queries 21 is B s closest node in order-1 square no node is between 17 and 21 in order-1 square. Suppose a node X in A s order-2 sibling square is between 17 and 21. By the replication rule, X picks 21 as its location server. 21 stores the location of all the nodes between 17 and 21 in order-2 square, obviously the one closest to 17. 10/27/05 Jie Gao, CSE590-fall05 43 X

Inform/update location servers A can update its location server inside a square S without knowing its identify. A routes to a square with geographical routing. The first node in the square S performs a location query of A. The query ends up at a node closest to A, who is A s location server! Hidden assumption: the nodes in S have distributed their locations inside S! 10/27/05 Jie Gao, CSE590-fall05 44

The bootstrapping When the entire system is turned on, order-1 squares exchange their information with local protocol, then nodes recruit their order-2 location servers and so on. No flooding needed. The location service is constructed by geographical unicast routing only. 10/27/05 Jie Gao, CSE590-fall05 45

Take a rest and enjoy the beauty of this algorithm It solves location service problem by using geographical routing. More locality sensitive: a node acquires the location from a nearby server. Load balancing: location servers are spatially distributed. Simple rule, simple construction and maintenance. Worst-case query behavior is not bounded, however. 10/27/05 Jie Gao, CSE590-fall05 46