Balancing the Tradeoffs between Data Accessibility and Query Delay

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Hadi Goudarzi and Massoud Pedram
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
Distributed Databases John Ortiz. Lecture 24Distributed Databases2  Distributed Database (DDB) is a collection of interrelated databases interconnected.
Effective Quorum Construction for Consistency Management in Mobile Ad Hoc Networks Takahiro HARA Osaka University, Japan.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Analyzing Multi-channel MAC Protocols for Underwater Sensor Networks Presenter: Zhong Zhou.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
A General approach to MPLS Path Protection using Segments Ashish Gupta Ashish Gupta.
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Update Log Dissemination in Mobile Ad Hoc Networks Hideki HAYASHI Hitachi, Ltd., Central Research Laboratory (Grad. School of Info. Science and Tech.,
Ad Hoc Mobility Management with Uniform Quorum Systems.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
Election Algorithms and Distributed Processing Section 6.5.
DEXA 2005 Quality-Aware Replication of Multimedia Data Yicheng Tu, Jingfeng Yan and Sunil Prabhakar Department of Computer Sciences, Purdue University.
Capacity Scaling with Multiple Radios and Multiple Channels in Wireless Mesh Networks Oguz GOKER.
Presented by Fei Huang Virginia Tech April 4, 2007.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
1 A Bidding Protocol for Deploying Mobile Sensors GuilingWang, Guohong Cao, and Tom LaPorta Department of Computer Science & Engineering The Pennsylvania.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
On Reducing Broadcast Redundancy in Wireless Ad Hoc Network Author: Wei Lou, Student Member, IEEE, and Jie Wu, Senior Member, IEEE From IEEE transactions.
Robustness of complex networks with the local protection strategy against cascading failures Jianwei Wang Adviser: Frank,Yeong-Sung Lin Present by Wayne.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
Load Balanced Link Reversal Routing in Mobile Wireless Ad Hoc Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department RPI Costas Busch CSCI Department.
A Multicast Routing Algorithm Using Movement Prediction for Mobile Ad Hoc Networks Huei-Wen Ferng, Ph.D. Assistant Professor Department of Computer Science.
Distributed, Self-stabilizing Placement of Replicated Resources in Emerging Networks Bong-Jun Ko, Dan Rubenstein Presented by Jason Waddle.
1 Low Latency Multimedia Broadcast in Multi-Rate Wireless Meshes Chun Tung Chou, Archan Misra Proc. 1st IEEE Workshop on Wireless Mesh Networks (WIMESH),
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
1 On the Interaction between Dynamic Routing in the Native and Overlay Layers Infocom2006 Srinivasan Seetharaman and Mostafa Ammar College of Computing.
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
William Stallings Data and Computer Communications
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Anirban Mondal (IIS, University of Tokyo, JAPAN)
Satisfaction Games in Graphical Multi-resource Allocation
Authors: Jiang Xie, Ian F. Akyildiz
Greedy Algorithms.
Greedy & Heuristic algorithms in Influence Maximization
Group Multicast Capacity in Large Scale Wireless Networks
On the Effect of Group Mobility to Data Replication in Ad Hoc Networks
The Impact of Replacement Granularity on Video Caching
Efficient Join Query Evaluation in a Parallel Database System
A paper on Join Synopses for Approximate Query Answering
Maximal Independent Set
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Wireless Ad Hoc Networks by Analogy to Electrostatic Theory
ISP and Egress Path Selection for Multihomed Networks
Weak Duplicate Address Detection in Mobile Ad Hoc Networks
by Saltanat Mashirova & Afshin Mahini
Data Replication in the Quality Space
Effective Social Network Quarantine with Minimal Isolation Costs
High Throughput Route Selection in Multi-Rate Ad Hoc Wireless Networks
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Peer-to-Peer Video Services
Connected Dominating Sets
Is Dynamic Multi-Rate Worth the Effort?
Effective Replica Allocation
IT351: Mobile & Wireless Computing
The Coverage Problem in a Wireless Sensor Network
Solving the Minimum Labeling Spanning Tree Problem
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
Presentation transcript:

Balancing the Tradeoffs between Data Accessibility and Query Delay in Ad Hoc Networks Lianzhong Yin and Guohong Cao 소프트웨어공 강동희 소프트웨어공 이동섭 소프트웨어공 유수연 소프트웨어공 전창오

Abstract ■ mobile ad hoc networks ■ reducing the query delay - nodes move freely - link/node failures are common - degrade the performance of data access ■ reducing the query delay ■ improving the data accessibility ■ balance the tradeoffs between data accessibility and query delay

Introduction ■ Mobile internet ■ Ad hoc network - Portable computers and wireless networks are becoming widely available ■ Ad hoc network - mobile users may want to communicate with each other in situations - Emergency rescue workers after an earthquake - a group of soldiers

In ad hoc network ■ Disconnections may occur frequently - Low data accessibility ■ Data replication - Improve data accessibility - reduce the query delay - a group of soldiers

In ad hoc network ■ limited resource - mobile nodes to cooperate with each other - tradeoff between query delay and data accessibility ■ Propose data replication schemes - balance the tradeoffs between data accessibility and query delay

Related works ■ Data replication in Web Environment - Links and nodes are stable in Web ■ Data replication in Distributed database systems - Nodes are more reliable and less likely to fail than that in ad hoc ■ Data replication in Wireless network - Not multi-hop ad hoc network

Related works ■ Hara’s data replication schemes ( Related to two previous papers) - Link Failure and Query Delay were not considered ■ Caching used to improve Data Accessibility and query delay - Caching schemes are passive approaches. (vs. Ours are proactive)

Contribution ■ Greedy Schemes (vs SAF ? ) - Local Data CF > Greedy-S ■ OTOO (One-To-One Optimization) Scheme (vs DAFN ? ) - cooperates with at most one neighbor ■ RN (Reliable Neighbor) Scheme (vs DCG ? ) - Increasing degree of cooperation

Preliminaries ■ System Model m: the total number of mobile nodes ( N1, N2,..., Nm ) Ni: mobile node i n: the total number of data items in the database di: data item i si: the size of di C: the memory size of each mobile node for hosting data replicas. fij: the link failure probability between node Ni and Nj (fij = fji: assume symmetric link conditions) aij: the access frequency of node Ni to dj ■ Each mobile node can only host C, C<n ( limited memory size ) ■ Data Accessibility = the number of successful data accesses / the total number of data accesses

Preliminaries ■ Problem Analysis Data replication problem we studied is extremely hard in terms of the computational complexity. Even for a simplified version of the problem, it is still NP-hard to approximate the problem We present heuristics that can provide satisfying performance with very small computation overhead ■ NP-hard in computational complexity theory, is a class of problems that are, informally, "at least as hard as the hardest problems in NP“ ...... ■ Heuristic refers to experience-based techniques for problem solving, learning, and discovery ......

The Proposed Data Replication Schemes ■ An Example - Only two nodes N1, N2 - Same-size data items d1, d2, d3, d4 - Each node only has enough space to host two data items - According to the DAFN scheme Data N1 N2 d1 0.60 0.50 d2 0.30 0.40 d3 0.05 d4 Step 1 Step 2 N1 N2 d1 d2 N1 N2 d1 d4 d3 d2 ■ DAFN is good duplicated data remove ...... memory size is used effectively

The Proposed Data Replication Schemes However, DAFN does not consider link failure probability. When the link failure probability is high... data accessibility is decreased We consider the link stability between mobile nodes and the query delay. Due to the complexity of the problem, next, we present the heuristics used in our solution DAFN OUR 0.25 N1 N2 d1 d4 d3 d2 N1 N2 d1 d2

The Proposed Data Replication Schemes ■ Mobile nodes have limited memory space. Therefore, it is important for mobile nodes to contribute part of their memory to hold data for other nodes. This is some kind of cooperation between mobile nodes. ■ Bad cooperation may actually reduce the performance, as show in the example above ■ If Links to other nodes are stable ... More cooperation ■ If Links to other nodes are not very stable ... Hosting more of the interested data locally

The Proposed Data Replication Schemes ■ Greedy ■ Zipf Law

The Proposed Data Replica Schemes ■ Greedy Schemes - Overview No cooperation with neighboring node Naïve Greedy : Allocate the most frequently access data until memory is full, not considering data size difference Greedy-S : Assume that each data item has different size sk , Allocate in descending order of Access Frequency(AFi(k)) until memory is full AFi(k) = aik/sk AFi(k) : Access Frequency of Ni to data item dk aik : access frequency of Ni to data item dk Sk : size of data item dk

The Proposed Data Replica Schemes ■ Greedy Schemes - Performance Analysis(1) < Assumptions and Definitions> For simplicity, the data size is assumed to be same in the analysis. (sk=1) Because of computational complexity, we give an upper bound of the data accessibility by using super-optimal algorithm (maybe better than optimal and not feasible). Ni may have multiple one-hop neighbors. fNi = the probability of all links between Ni and its neighbors fail Ni hosts C most frequently accessed data Sc : the set of data items which Ni hosts as most frequently accessed data. (the set of data items Ni has in its local memory) 16

The Proposed Data Replica Schemes ■ Greedy Schemes - Performance Analysis(2) Because accessing local data is always successful, Data accessibility is larger than the sum of access frequency to local data items. Data accessibility of greedy scheme Super-optimal solution for Ni allocating the other data in a way that they are all accessible from Ni’s neighbors. (impossible in practice) Therefore, Super-optimal : 필요한 데이터를 로컬에서 취하거나 + 링크가 단절되지 않는 한 이웃 노드들로 부터 취한다 17

The Proposed Data Replica Schemes ■ Greedy Schemes - Numeric Result 1. Greedy schemes performs relatively well even when compared to super-optimal scheme which is not feasible 2. Zipf-parameter θ is larger = Data accesses focus on more hot data = Data access more skewed  greedy scheme performs better because more hot data served by local copies 3. Drawback : not considering cooperation between neighboring nodes  limited performance 18

CAF1ij(k) = (aik + ajk*(1-fij)) /sk The Proposed Data Replica Schemes ■ OTOO (One-To-One Optimization) Scheme Each node only cooperates with at most one neighbor CAF1ij(k) = (aik + ajk*(1-fij)) /sk 3) 1) 2) CAF1ij(k) : Combined Access Frequency value of Ni and Nj to data item dk at Ni (Ni and Nj are neighboring nodes) Allocate in descending order of CAF1 value until memory is full. CAF1 value has 3 considerations : 1) considers the access frequency from a neighboring node (Data Accessibility↑) 2) considers the data size 3) gives the access frequency from the node itself a high priority (Data Accessibility↑, Query Delay↓) 19

The Proposed Data Replica Schemes ■ OTOO (One-To-One Optimization) Scheme OTOO Scheme works as follows: 0. All nodes are marked as “white” initially (no allocation process yet) 1. Broadcasting : Node ids and access frequency for each data item 2. Invitation, Calculation and Allocation : Invitation to the most stable neighboring node (neighbor with the lowest fij) , Calculating CAF1 value and Allocation  Both nodes are marked as “black”, no longer participate the allocation 3. In case of two or more nodes processing at the same time (M2 , M3 and M5) : When receiving more than one invitation : accepts the invitation from the node with the lowest id (M2, M3 -> M4) 4. No more white neighbors : allocating its own most interested data items (M3) M5 M7 M1 M2 M4 M6 M3 20

The Proposed Data Replica Schemes ■ RN (Reliable Neighbor) Scheme Increasing degree of cooperation : Contribute more memory to replicate data for Reliable neighbors. Reliable Neighbors For Ni, if 1-fij > Tr , then Nj is reliable neighbor. And let nb(i) be the set of the Ni’s reliable neighbors. Total Contributed memory size of Ni, Cc(i) is set to be, If links are stable, Cc is larger (as 1-fji ↑), but if not stable, then Cc(i) is smaller. α is system tuning factor ; α ↓  Cc(i) ↑  more cooperation with neighbors (RN2>RN8>RN16) [C-Cc(i)] Ni first allocates its most interested data up to C-Cc(i) memory space [Cc(i)] In descending order of CAF2 value of Ni to dk, allocate the rest of data. 21

Simulation experiments ■ Simulation Model - m nodes are placed randomly in a 1500m * 1500m area. - radio range is set to be D. - nodes can communicate with each other. - link may fail. - the number of data items n is set to be the same as the number of nodes m. - data item di’s original host is Ni - δ values ranging from 0.6 to 1.4 - each node has a memory size of C ■ Access patterns - different access pattern 1) all nodes follow the Zipf-like access pattern 2) different nodes have different hot data. 3) randomly selecting an offset value for each node Ni : offset i is between 1 and n-1. - same access pattern 1) all nodes have the same access pattern. 2) all nodes have the same access probability to the same data item. ■ Performance metrics - data accessibility - query delay

Simulation experiments ■ Fine-tuning the RN scheme – same access pattern - threshold value Tr (4.3.3 The Reliable Neighbor (RN) Scheme) - RN2 > RN8 > RN16 - Tr has the largest effect on the performance of RN2 : RN2 contributes the largest portion of the memory size to neighbors. - Tr = 0.6 achieves a balance between the data accessibility and query delay. RN2 RN2 RN8 RN8 RN16 RN16

Simulation experiments ■ Effects of Zipf Parameter (θ) – different access pattern - As θ increases, more accesses focus on hot data items and the data accessibility is expected the increase. - Proposed schemes outperform the DAFN scheme in terms of data accessibility in almost all cases. - Proposed schemes 1) consider the link failure probability when replicating data 2) avoid replicating data items that are not frequently accessed by using the CAF value. - DAFN scheme 1) does not consider the link failure probability 2) sometimes replicates data item with low access frequency instead of frequently accessed data items. DAFN

Simulation experiments ■ Effects of Zipf Parameter (θ) – different access pattern (continue) - DAFN scheme tries to avoid duplicated items among neighboring nodes, which means that even if a data item is popular among two neighboring nodes, it is still allocated at only one of the neighboring nodes. - RN2 > RN8 = RN16 > OTOO - Nodes have different interest, it is better for them to host data they are interested in. - Cooperation does not have advantages. DAFN RN2 RN8 = RN16 OTOO (best)

Simulation experiments ■ Effects of Zipf Parameter (θ) – same access pattern - Greedy-S performs better than Greedy. : it gives higher priority to data items with smaller size, and thus more important data can be replicated. - data accessibility : RN2 > RN8 > RN16 > OTOO (RN2 performs the best) - query delay : RN2> RN8 > RN16 > OTOO (OTOO performs the best) - Higher degree of cooperation improves the data accessibility, but it also increases the query delay. RN2 RN2 Greedy-S RN8 RN8 > RN16 > OTOO RN16 OTOO Greedy DAFN

Simulation experiments ■ Effects of Radio Range (D) – same access pattern - When the radio range increases, the network is better connected and the accessibility is expected to increase. - Data accessibility 1) Data accessibility increases as the radio range increases. 2) Radio range is very large, different schemes have similar data accessibility. - Query delay 1) Query delay increases as the radio range increases. 2) Network is better connected, some data are previously not available can not be found at faraway nodes. - Total traffic 1) Greedy, Greedy-S scheme generate lowest replication traffic (do not cooperate) 2) DAFN tries to remove duplicated data items in neighboring nodes. – highest traffic 3) RN2 > RN8 > RN16 (RN2 contributes a large amount of memory space to neighboring nodes) similar DAFN DAFN RN2 RN8 RN16 DAFN Greedy Greedy-S Near zero

Simulation experiments ■ Effects of the Error Factor of Link Failure Estimation (δ) - DAFN, Greedy, Greedy-S is not affected by δ as they do not depend on the estimation of link failure probability. - RN2, RN8, RN16, OTOO, the effect is not very significant even when the error is very large. : Proposed schemes robust and not sensitive to estimation errors. Greedy-S DAFN Greedy Greedy Greedy-S DAFN

Conclusion ■ Propose Three Method - Greedy Schemes (cf > Greedy – s) : Local Data - OTOO (One-To-One Optimization) Scheme : cooperate with only one neighboring node (at most one neighbor) - RN (Reliable Neighbor) Scheme : cooperate with more neighboring nodes and contributes more memory for data of neighboring nodes ■ Link Failure considered, try to Balance Data accessibility and Query Delay ■ Our proposed schemes can provide high data accessibility and achieve balance between Data accessibility and Query Delay

감사합니다

Appendix#01. Zipf-like Distribution : Access Probability of kth data item (1<=k<=n) in Zipf-like distribution Pak When n=100… Θ = 1 : y=0.2/x Θ = ½ : y=0.05/√x Θ=0 : y=0.01 θ larger  more access focus on the hot data, data access pattern more skewed Θ = 1 0< Θ <1 k Θ =0 Hot data