Announcements Your homework is due on September 19 th. Your homework is due on September 19 th. I will be away starting Sept 5 th.

Slides:



Advertisements
Similar presentations
Cost-Based Cache Replacement and Server Selection for Multimedia Proxy Across Wireless Internet Qian Zhang Zhe Xiang Wenwu Zhu Lixin Gao IEEE Transactions.
Advertisements

Replication Strategies in Unstructured Peer-to-Peer Networks Edith Cohen Scott Shenker This is a modified version of the original presentation by the authors.
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Generated Waypoint Efficiency: The efficiency considered here is defined as follows: As can be seen from the graph, for the obstruction radius values (200,
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Evaluation of Ad hoc Routing Protocols under a Peer-to-Peer Application Authors: Leonardo Barbosa Isabela Siqueira Antonio A. Loureiro Federal University.
1 Placement of Continuous Media in Wireless Peer-to-Peer Networks Shahram Ghadeharizadeh, Bhaskar Krishnamachari, Shanshan Song, IEEE Transactions on Multimedia,
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Placement of Continuous Media in Wireless Peer-to-Peer Network Shahramram Ghandeharizadeh, Bhaskar Krishnamachari, and Shanshan Song IEEE Transactions.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
Improving Proxy Cache Performance: Analysis of Three Replacement Policies Dilley, J.; Arlitt, M. A journal paper of IEEE Internet Computing, Volume: 3.
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Computer Science Department Stony Brook University.
Lecture 3: A Case for RAID (Part 1) Prof. Shahram Ghandeharizadeh Computer Science Department University of Southern California.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (II) 11th Week
ICNP'061 Benefit-based Data Caching in Ad Hoc Networks Bin Tang, Himanshu Gupta and Samir Das Department of Computer Science Stony Brook University.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Announcements Now: focus on your Midterm 1, one week from today. Now: focus on your Midterm 1, one week from today.  Make sure you understand the papers.
Novel Self-Configurable Positioning Technique for Multihop Wireless Networks Authors : Hongyi Wu Chong Wang Nian-Feng Tzeng IEEE/ACM TRANSACTIONS ON NETWORKING,
Squirrel: A decentralized peer- to-peer web cache Paul Burstein 10/27/2003.
A Hybrid Caching Strategy for Streaming Media Files Jussara M. Almeida Derek L. Eager Mary K. Vernon University of Wisconsin-Madison University of Saskatchewan.
A Case for Delay-conscious Caching of Web Documents Peter Scheuermann, Junho Shim, Radek Vingralek Department of Electrical and Computer Engineering Northwestern.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang, and Ya-Qin Zhang IEEE TRANSACTIONS ON MULTIMEDIA,
Multimedia Information Systems Shahram Ghandeharizadeh Computer Science Department University of Southern California.
CSCI 599: Science of Design for Continuous Media Applications Shahram Ghandeharizadeh Associate Professor Computer Science Department University of Southern.
CSCI 599: Delivery of Continuous Media in Mobile Ad-Hoc Networks of Gaming Devices Shahram Ghandeharizadeh Computer Science.
A Node-Centric Load Balancing Algorithm for Wireless Sensor Networks Hui Dai, Richar Han Department of Computer Science University of Colorado at Boulder.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University.
1 Cache Me If You Can. NUS.SOC.CS5248 OOI WEI TSANG 2 You Are Here Network Encoder Sender Middlebox Receiver Decoder.
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Distributed Location-aware Transmission for Ad-Hoc Networks Bey-Ling Su 1/29/2004.
Segment-Based Proxy Caching of Multimedia Streams Authors: Kun-Lung Wu, Philip S. Yu, and Joel L. Wolf IBM T.J. Watson Research Center Proceedings of The.
A novel approach of gateway selection and placement in cellular Wi-Fi system Presented By Rajesh Prasad.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Coordinated Sensor Deployment for Improving Secure Communications and Sensing Coverage Yinian Mao, Min Wu Security of ad hoc and Sensor Networks, Proceedings.
On Distinguishing the Multiple Radio Paths in RSS-based Ranging Dian Zhang, Yunhuai Liu, Xiaonan Guo, Min Gao and Lionel M. Ni College of Software, Shenzhen.
A Case for a Mobility Based Admission Control Policy Shahram Ghandeharizadeh 1, Tooraj Helmi 1, Shyam Kapadia 1, Bhaskar Krishnamachari 1,2 1 Computer.
Understanding the Performance of Web Caching System with an Analysis Model and Simulation Xiaosong Hu Nur Zincir-Heywood Sep
Annoucements Read the papers for next week posted on Read the papers for next week posted on
Small-Scale and Large-Scale Routing in Vehicular Ad Hoc Networks Wenjing Wang 1, Fei Xie 2 and Mainak Chatterjee 1 1 School of Electrical Engineering and.
《 Hierarchical Caching Management for Software Defined Content Network based on Node Value 》 Reporter : Jing Liu , China Affiliation : University of Science.
S Master’s thesis seminar 8th August 2006 QUALITY OF SERVICE AWARE ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Thesis Author: Shan Gong Supervisor:Sven-Gustav.
PROP: A Scalable and Reliable P2P Assisted Proxy Streaming System Computer Science Department College of William and Mary Lei Guo, Songqing Chen, and Xiaodong.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
A BRIEF INTRODUCTION TO CACHE LOCALITY YIN WEI DONG 14 SS.
Network Connectivity of VANETs in Urban Areas Wantanee Viriyasitavat, Ozan K. Tonguz, Fan Bai IEEE communications society conference on sensor, mesh and.
1 A Multi-Rate Routing Protocol with Connection Entropy for MANETs Cao Trong Hieu, Young Cheol Bang, Jin Ho Kim, Young An Kim, and Choong Seon Hong Presenter:
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Peer-to-Peer Video Systems: Storage Management CS587x Lecture Department of Computer Science Iowa State University.
Video Caching in Radio Access network: Impact on Delay and Capacity
A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem C.-F. Huang, H.-W. Lee, and Y.-C. Tseng Department of.
A New Class of Mobility Models for Wireless Mobile Communication Networks Joshua Gabet Advisor: Carl Baum Clemson University SURE 2005.
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
A New Class of Mobility Models for Ad Hoc Wireless Networks Rahul Amin Advisor: Dr. Carl Baum Clemson University SURE 2006.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
Power-Aware Topology Control for Wireless Ad-Hoc Networks Wonseok Baek and C.-C. Jay Kuo Department of Electrical Engineering University of Southern California.
Presented by Edith Ngai MPhil Term 3 Presentation
Golrezaei, N. ; Molisch, A.F. ; Dimakis, A.G.
The Impact of Replacement Granularity on Video Caching
On the Critical Total Power for k-Connectivity in Wireless Networks
任課教授:陳朝鈞 教授 學生:王志嘉、馬敏修
Routing in Wireless Ad Hoc Networks by Analogy to Electrostatic Theory
Evaluating Proxy Caching Algorithms in Mobile Environments
Peer-to-Peer Video Services
CSCI 465 Data Communications and Networks Lecture 16
Simulation for Cache Mesh Design
Presentation transcript:

Announcements Your homework is due on September 19 th. Your homework is due on September 19 th. I will be away starting Sept 5 th and will see you on Sept 19 th. I will be away starting Sept 5 th and will see you on Sept 19 th.  Make sure to attend lectures and listen to video taped tutorials. They are essential for your homework and project. Professor Francois Bar is guest lecturer on September 26 th. Professor Francois Bar is guest lecturer on September 26 th. Professor Anne Friedberg is guest lecturer on October 10 th. Professor Anne Friedberg is guest lecturer on October 10 th.

Any Homework Questions?

Question from last week

CSCI 599: Replication in Ad Hoc Network of Wireless Devices Shahram Ghandeharizadeh Computer Science Department University of Southern California

Outline Target environment: H2O networks. Target environment: H2O networks. Definition of access cost. Definition of access cost. GreedyDual replacement technique. GreedyDual replacement technique. Conclusion and future research. Conclusion and future research.

Target Environment Key characteristics: Key characteristics:  Limited by the bandwidth and radio range of wireless devices (less constrained by energy and mobility).  Management of devices is decentralized.  Each device is autonomous.  Devices cooperate when in radio-range of one another.

Home-to-Home Online (H2O) devices collaborate to deliver continuous media: Home-to-Home Online (H2O) devices collaborate to deliver continuous media: A H2O device is a wireless device with a powerful processor and abundant amount of storage. A H2O device is a wireless device with a powerful processor and abundant amount of storage. Example: H2O Clouds S. Ghandeharizadeh, H2O Clouds: Issues, Challenges and Solutions, in IEEE Pacific-Rim Conference on Multimedia, 2003.

Cost of a clip Euclidean distance between the nearest replica and the requesting node. Euclidean distance between the nearest replica and the requesting node. In a grid, the Euclidean distance between two nodes is defined as: In a grid, the Euclidean distance between two nodes is defined as:

Euclidean distance Euclidean distance between the orange and green nodes is: Euclidean distance between the orange and green nodes is:  = = 13  SQRT (13) = 3.61

Euclidean distance: 1 replica Maximum Euclidean distance to the green node containing a replica of the required data item is: Maximum Euclidean distance to the green node containing a replica of the required data item is:  = = 8  SQRT (8) = 2.83

Euclidean distance: 4 replicas Maximum Euclidean distance to the green node containing a replica of the required data item is: Maximum Euclidean distance to the green node containing a replica of the required data item is:  = = 2  SQRT (2) = 1.41 Four fold increase in number of replicas provided only a factor of 2 improvement in Euclidean distance. Four fold increase in number of replicas provided only a factor of 2 improvement in Euclidean distance.

Main assumption 1. Claim: In a 2-D mesh network, the Euclidean distance between the nearest replica and the requesting node is:  d i is density of replicas for the i-th object.  Can you provide a proof for this? (Potential project for the theoreticians in the class.) 2. Ignores issues risen from the boundary by assuming an unbounded network.

GreedyDual Algorithm L = 0 For each request for object i do If i is in the local cache then H(i) = L + C(i) Else while there is no space for i do L = min{ H(j) such that j is in cache } Evict j which satisfies H(j) = L Retrieve and store i H(i) = L + C(j) When object size is variable then replace C(i) with C(i)/object-size. When object size is variable then replace C(i) with C(i)/object-size.

GreedyDual Algorithm Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Cost of objects is as follows: Cost of objects is as follows:  C(A) = 12, C(B)=7, C(E)= 5, C(D)=1 Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. If the next reference is again for E then H(E)=? If the next reference is again for E then H(E)=?

GreedyDual Algorithm Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Cost of objects is as follows: Cost of objects is as follows:  C(A) = 12, C(B)=7, C(E)= 5, C(D)=1 Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. If the next reference is again for E then H(E)=7 If the next reference is again for E then H(E)=7 What object is evicted if D is referenced? What object is evicted if D is referenced?

GreedyDual Algorithm Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Consider a node with storage capacity of 3 objects. Its storage is occupied with objects A, B, and D Cost of objects is as follows: Cost of objects is as follows:  C(A) = 12, C(B)=7, C(E)= 5, C(D)=1 Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. Reference for object E causes the algorithm to evict D because it has the lowest cost, L is set to 1, H(E)=6. If the next reference is again for E then H(E)=12 If the next reference is again for E then H(E)=12 What object is evicted if D is referenced? B, L is now 7, H(D) = 8 What object is evicted if D is referenced? B, L is now 7, H(D) = 8

Modified GreedyDual Change the algorithm to not increase H(i) when it is referenced frequently: Change the algorithm to not increase H(i) when it is referenced frequently: L = 0 For each request for object i do If i is in the local cache then do nothing Else while there is no space for i do L = min{ H(j) such that j is in cache } Evict j which satisfies H(j) = L Retrieve and store i H(i) = L + C(j)

Evaluation Assumes a fixed square area. Assumes a fixed square area. 40,000 nodes in the mesh network, distributed randomly. 40,000 nodes in the mesh network, distributed randomly. A node may store 25 objects. A node may store 25 objects. Number of objects is 10,000 with Zipf distribution of access. Number of objects is 10,000 with Zipf distribution of access. Dijkstra’s shortest path algorithm Dijkstra’s shortest path algorithm  Link cost = physical distance On average a node has more than 5 directly connected neighbors. On average a node has more than 5 directly connected neighbors. Normalized access cost = cost / diagonal of the square area. Normalized access cost = cost / diagonal of the square area.

Performance Results More skewed

Performance Results

Performance results What other number might be reported? What other number might be reported?

Performance results What other number might be reported? What other number might be reported?  Number of replacements performed by each node.  Percentage hit ratio for each node: average & standard deviation.  Cold start, and finish Was a node thrashing? Was a node thrashing?  Is it possible for a node to thrash?

Possible project 1 A literature survey of dynamic replacement policies for H2O networks. It must include a comparison with: A literature survey of dynamic replacement policies for H2O networks. It must include a comparison with:  Memory management techniques for an audio/video-on-demand server.  Cache servers designed for the Internet.  Cache servers designed for environments such as Akamai.

Possible project 2 Compare GreedyDual with a technique such as LRU: Compare GreedyDual with a technique such as LRU:  How much improvement does GreedyDual provide?  How does this improvement change as a function of storage capacity of a node?  Does one technique exhibit a thrashing behavior? How would you set the experiment up? How would you set the experiment up? What would be the important parameters to quantify and analyze? What would be the important parameters to quantify and analyze? Remember the 10 Commandments when attempting this project. Remember the 10 Commandments when attempting this project.

Class Collaborative Project Theme: What if cars became driver-less by the year 2100? Theme: What if cars became driver-less by the year 2100?  What would information services would be available in the car?  How would the car be used as an extension of a home/office? Deliverable: Deliverable:  A script that serves as the basis of a video-clip (similar to AutoMatas) describing the future information service in cars that drive themselves.  What signs are there that cars will be able to drive themselves?