Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1.

Slides:



Advertisements
Similar presentations
Mathematical Preliminaries
Advertisements

1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Advanced Piloting Cruise Plot.
Feichter_DPG-SYKL03_Bild-01. Feichter_DPG-SYKL03_Bild-02.
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
Author: Julia Richards and R. Scott Hawley
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
Energy-Efficient Distributed Algorithms for Ad hoc Wireless Networks Gopal Pandurangan Department of Computer Science Purdue University.
and 6.855J Cycle Canceling Algorithm. 2 A minimum cost flow problem , $4 20, $1 20, $2 25, $2 25, $5 20, $6 30, $
Introduction to Algorithms
and 6.855J Spanning Tree Algorithms. 2 The Greedy Algorithm in Action
Scalable Routing In Delay Tolerant Networks
Summary of Convergence Tests for Series and Solved Problems
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Exit a Customer Chapter 8. Exit a Customer 8-2 Objectives Perform exit summary process consisting of the following steps: Review service records Close.
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Solve Multi-step Equations
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Break Time Remaining 10:00.
7 Applications of Integration
Data Structures: A Pseudocode Approach with C
ABC Technology Project
COMP 482: Design and Analysis of Algorithms
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
VOORBLAD.
15. Oktober Oktober Oktober 2012.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
Copyright © 2013, 2009, 2006 Pearson Education, Inc.
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Squares and Square Root WALK. Solve each problem REVIEW:
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
© 2012 National Heart Foundation of Australia. Slide 2.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
25 seconds left…...
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Chapter 10: The Traditional Approach to Design
Systems Analysis and Design in a Changing World, Fifth Edition
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
1/22 Worst and Best-Case Coverage in Sensor Networks Seapahn Meguerdichian, Farinaz Koushanfar, Miodrag Potkonjak, and Mani Srivastava IEEE TRANSACTIONS.
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
all-pairs shortest paths in undirected graphs
Minimum Vertex Cover in Rectangle Graphs
Range Queries in Distributed Networks Jie Gao Stony Brook University Dagstuhl Seminar, March 14 th,
Boundary Recognition in Sensor Networks by Topology Methods Yue Wang, Jie Gao Dept. of Computer Science Stony Brook University Stony Brook, NY Joseph S.B.
1 Shape Segmentation and Applications in Sensor Networks Xianjin Xhu, Rik Sarkar, Jie Gao Department of CS, Stony Brook University INFOCOM 2007.
Shape Segmentation and Applications in Sensor Networks
Presentation transcript:

Differential Forms for Target Tracking and Aggregate Queries in Distributed Networks Rik Sarkar Jie Gao Stony Brook University 1

Target Tracking with Sensor Networks 2

Target Queries Range queries: # targets within any geographic range R. Tracking queries: Find the yellow car. Closest target queries 3

Naïve Solutions for Range Queries Sensors report targets to a central station. – Bottleneck and single point of failure. – Update cost is high. – Query cost is high if the central station is far away. Flood the region R, count # of targets. – Update cost ~ target movement distance. – Query cost ~ Area of R. 4

Our Solution Use differential forms for tracking and answering range queries of mobile targets. – Decentralized. – Update cost ~ target movement distance – Query cost ~ Perimeter of R – Robust to node failures, link dynamics, mobility, coverage holes, sensing errors, location inaccuracies. 5

Using Range Queries for Target Tracking Find the yellow car? 1.Exponentially expand the range – Stops when the range contains the target 2.Recurse & refine Total cost =O(d) Distance sensitive queries 6 d …+d/2+d < 2d

Outline Differential 1-form Algorithms for computing 1-form Network complications: – Dynamics: node/edge failures – Sensing errors – Network coverage holes Simulations and comparisons 7

Differential 1-Form A function defined on edges of a planar graph – Integrating the edge weights on region boundary gives the total weight of the targets inside. 8 1.Extract a planar graph. 2.Range query: walk along region boundary and sum up edge weights. 3.Target movement: change edge weight when a target crosses an edge

Definition: Differential 1-Form Planar graph G: a target stays within a face. Maintain “directed” weights f on edges. For each face, summing up weights clockwise gives the total weights of targets inside: 9 1/ f(e)= w f(-e)= -w

Boundary Operator Formally, a boundary operator applies on a face and returns the sum of the boundary edges in clockwise directions. Extend f to a face. 10 1/3 ∂[]= 1/3 f[f[]= f[∂ 1/3 ]= f[]=1

Boundary Operator Boundary operator on a union of faces. 11 ∂[]= ∂[]+∂[] = a b c + -b = d e a c d e

Differential 1-Form for Range Queries Theorem: the total weights of targets inside a region R is the sum of edge weights of ∂R. – R is simply a collection of faces, possibly disconnected. Range query: walk along ∂R in clockwise order and sum up edge weights. 12

Update 1-Form When Targets Move If a target crosses an edge e, subtract target weight from f(e)

Communication Cost Assuming sensors have constant density. Update cost = # edges crossed = O(distance moved) Query cost = # edges on ∂R = O(perimeter of R) 14

Multiple Targets Counting range query only – Maintain a single 1-form for all targets Queries for identifiable targets – Maintain a 1-form for each target. Maintain 1-form for each identifiable family of targets. – E.g., all cabs, all police cars, etc. – # cabs in the neighborhood, find a nearby cab 15

Outline Differential 1-form Algorithms for computing 1-form Network complications: – Dynamics: node/edge failures – Sensing inaccuracies – Network holes Simulations and comparisons 16

Extract a Planar Graph Extract a planar graph from connectivity graph – Location-based schemes e.g., [Gao, et al, 01] [Sarkar et al, 09] – Location-free schemes e.g., [Funke, Milosavljevic 07] [Zhang et. al, 08] Virtual planar graph – Only requirement: tell whether a target is within a face or not. 17

Initializing Differential 1-Form New targets coming into the network – Simply update f when a target comes in. For existing targets: – Imagine the target enters from the face of infinity along any path. 18 w w w

Multiple Targets: Sweep the Network Find a spanning tree T’ of the dual graph G’, rooted at the face of infinity. Aggregate the weight of edges on T’. Weight of an edge in the primal = weight of the dual edge. Total communication cost for initialization =O(n) 19

Outline Differential 1-form Algorithms for initializing 1-form Network complications: – Dynamics: node/edge failures – Sensing inaccuracies – Network holes Simulations and comparisons 20

Robustness to Link or Node Failures A link failure or node failure in the interior or exterior of R does not affect the query result. 21

Robustness to Node Insertion Node insertion: refine the current face and give proper weights to the new edges. The weight of existing edges are not affected. 22

Robustness to Coverage Holes A target can be lost in the hole but range query results of a region enclosing or disjoint of the hole are not affected. 23

Ranges Cutting Through Holes or, geometric ranges not following graph edges Take the best inner and outer approximation. Refine with detailed info from sensors near boundary 24

Robustness to Sensing Errors or Location Inaccuracies We are unsure of the precise target location but know the target is within a range. Any range query fully enclosing or disjoint with the target “feasible location” region gives correct results. 25

Tracking with Mobile Sensors Sensors can move. – Maintain the planar graph. e.g., [Karp Kung 2001] [Gao, et al, 01] – When a target crosses an edge, update the 1- form. 26

Range Query of Continuous Data Fields Sensors monitor a temperature field. Treat each sensor reading as a target with certain weight. Apply the same scheme. 27

Outline Differential 1-form Algorithms for initializing 1-form Network complications: – Dynamics: node/edge failures – Sensing inaccuracies – Network holes Simulations and comparisons – Compare with location services – Robustness to link failures and sensing errors 28

29 Comparison with Location Services LLS [Abraham etal 2004] – Track a mobile target – Distributed hash table with hierarchical partitions Tracked by one (hashed) location server at each square containing it at each level. Query goes to the (hashed) location server at each square containing the query node. Query cost : O(d) d

30 Location Services LLS: lazy updates – A target does not trigger updates unless it moves outside the 9 squares. – The cost is O(d’). – The distance travelled is Ω(d’). – Do this for each level Total update cost: O(d’logd’) amortized, where d’ is the movement distance. d’

Differential Forms v.s. LLS Differential form Designed for range queries Use recursive search for tracking query 31 LLS Designed for tracking query Use recursive search for range query --- query maximum quads within R.

Differential Forms v.s. LLS Range query cost Differential forms << LLS Query individual targets Differential forms ~ 2 · LLS Update cost Differential forms << LLS O(d) v.s. O(d log d) 32

33 Update Costs The target moves one unit randomly per time unit --- discrete Brownian motion. LLS cost is amortized, some moves are expensive. Average costs Max costs

34 Range Queries Costs Ranges: random rectangles Caveats: for LLS we use the same hierarchy for all targets --- which saves query cost. Average costs Max costs

35 Tracking Query Costs Query for individual targets The expanding and refinement steps makes differential forms more costly. Average costs Max costs

Target Detection Errors Fail to detect a target crossing an edge – Prob p: failure rate Target location error – LR: max distance of estimated loc from true loc Ranges: random axis-parallel rectangles Relative error = error in counts/ # targets 36

Robustness to Crossing Errors 37

Robustness to Sensor Location Errors 38 Overcounting and undercounting cancel out.

Summary Differential form is a topological notion. – “Location-free” method Robust to network changes and sensing errors Sub-sampling sensors to conserve power by allowing gracefully degradation of query results. 39

Thank you! Questions and comments? 40