Xingbo Yu ()ICS280sensors Winter 2005 Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Networks A.ManJhi, S. Nath P. Gibbons CMU.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Data and Computer Communications
Shi Bai, Weiyi Zhang, Guoliang Xue, Jian Tang, and Chonggang Wang University of Minnesota, AT&T Lab, Arizona State University, Syracuse University, NEC.
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
Multicast in Wireless Mesh Network Xuan (William) Zhang Xun Shi.
Minimum Energy Mobile Wireless Networks IEEE JSAC 2001/10/18.
Algorithms in sensor networks By: Raghavendra kyatham.
Data and Computer Communications Ninth Edition by William Stallings Chapter 12 – Routing in Switched Data Networks Data and Computer Communications, Ninth.
1 Structures for In-Network Moving Object Tracking inWireless Sensor Networks Chih-Yu Lin and Yu-Chee Tseng Broadband Wireless Networking Symp. (BroadNet),
Lecture 7: Synchronous Network Algorithms
1 Routing Techniques in Wireless Sensor networks: A Survey.
A Framework for Secure Data Aggregation in Sensor Networks Yi Yang Xinran Wang, Sencun Zhu and Guohong Cao The Pennsylvania State University MobiHoc’ 06.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
SYNOPSIS DIFFUSION For Robust Aggregation in Sensor Networks Suman Nath, Phillip B. Gibbons, Srinivasan Seshan, Zachary R. Anderson Presented by Xander.
DNA Research Group 1 CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Network Streams Amit Manjhi, Suman Nath, Phillip B. Gibbons Carnegie Mellon University.
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
P2P Course, Structured systems 1 Introduction (26/10/05)
CS 580S Sensor Networks and Systems Professor Kyoung Don Kang Lecture 7 February 13, 2006.
Connected Dominating Sets in Wireless Networks My T. Thai Dept of Comp & Info Sci & Engineering University of Florida June 20, 2006.
ROUTING ON THE INTERNET COSC Aug-15. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks Research Paper By V. D. Park and M. S. Corson.
New Protocols for Remote File Synchronization Based on Erasure Codes Utku Irmak Svilen Mihaylov Torsten Suel Polytechnic University.
Broadcast & Convergecast Downcast & Upcast
CS2510 Fault Tolerance and Privacy in Wireless Sensor Networks partially based on presentation by Sameh Gobriel.
Hongyu Gong, Lutian Zhao, Kainan Wang, Weijie Wu, Xinbing Wang
1 SD-Rtree: A Scalable Distributed Rtree Witold Litwin & Cédric du Mouza & Philippe Rigaux.
Offline Algorithmic Techniques for Several Content Delivery Problems in Some Restricted Types of Distributed Systems Mugurel Ionut Andreica, Nicolae Tapus.
Minimal Hop Count Path Routing Algorithm for Mobile Sensor Networks Jae-Young Choi, Jun-Hui Lee, and Yeong-Jee Chung Dept. of Computer Engineering, College.
CS4231 Parallel and Distributed Algorithms AY 2006/2007 Semester 2 Lecture 10 Instructor: Haifeng YU.
Wireless Sensor Networks COE 499 Energy Aware Routing
Join Synopses for Approximate Query Answering Swarup Achrya Philip B. Gibbons Viswanath Poosala Sridhar Ramaswamy Presented by Bhushan Pachpande.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Swarup Acharya Phillip B. Gibbons Viswanath Poosala Sridhar Ramaswamy Presented By Vinay Hoskere.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
EBAS: An Energy-Efficient Event Boundary Approximated Suppression Algorithm in Wireless Sensor Networks Longjiang Guo Heilongjiang University
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Dave McKenney 1.  Introduction  Algorithms/Approaches  Tiny Aggregation (TAG)  Synopsis Diffusion (SD)  Tributaries and Deltas (TD)  OPAG  Exact.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Data Communications and Networking Chapter 11 Routing in Switched Networks References: Book Chapters 12.1, 12.3 Data and Computer Communications, 8th edition.
Distributed Classification in Peer-to-Peer Networks Ping Luo, Hui Xiong, Kevin Lü, Zhongzhi Shi Institute of Computing Technology, Chinese Academy of Sciences.
MA/CSSE 473 Day 28 Dynamic Programming Binomial Coefficients Warshall's algorithm Student questions?
DATA AGGREGATION Siddhartha Sarkar Roll no: CSE-4 th Year-7 th semester Sensor Networks (CS 704D) Assignment.
When processing is cheaper than transmitting Daniel V Uhlig Maryam Rahmaniheris 1.
CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein - Columbia University.
Teknik Routing Pertemuan 10 Matakuliah: H0524/Jaringan Komputer Tahun: 2009.
Two Connected Dominating Set Algorithms for Wireless Sensor Networks Overview Najla Al-Nabhan* ♦ Bowu Zhang** ♦ Mznah Al-Rodhaan* ♦ Abdullah Al-Dhelaan*
By: Gang Zhou Computer Science Department University of Virginia 1 Medians and Beyond: New Aggregation Techniques for Sensor Networks CS851 Seminar Presentation.
A Framework for Reliable Routing in Mobile Ad Hoc Networks Zhenqiang Ye Srikanth V. Krishnamurthy Satish K. Tripathi.
An Adaptive Zone-based Storage Architecture for Wireless Sensor Networks Thang Nam Le, Dong Xuan and *Wei Yu Department of Computer Science and Engineering,
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Fast.
March 9, Broadcasting with Bounded Number of Redundant Transmissions Majid Khabbazian.
Construction of Optimal Data Aggregation Trees for Wireless Sensor Networks Deying Li, Jiannong Cao, Ming Liu, and Yuan Zheng Computer Communications and.
Written By: Presented By: Swarup Acharya,Amr Elkhatib Phillip B. Gibbons, Viswanath Poosala, Sridhar Ramaswamy Join Synopses for Approximate Query Answering.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
ROUTING ON THE INTERNET COSC Jun-16. Routing Protocols  routers receive and forward packets  make decisions based on knowledge of topology.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
Network Layer COMPUTER NETWORKS Networking Standards (Network LAYER)
Probabilistic Data Management
Turnstile Streaming Algorithms Might as Well Be Linear Sketches
Introduction Wireless Ad-Hoc Network
Lecture 8: Synchronous Network Algorithms
Minimizing Broadcast Latency and Redundancy in Ad Hoc Networks
Switching Lemmas and Proof Complexity
Presentation transcript:

Xingbo Yu ()ICS280sensors Winter 2005 Tributaries and Deltas: Efficient and Robust Aggregation in Sensor Networks A.ManJhi, S. Nath P. Gibbons CMU

Xingbo YuICS280sensors, Winter 2005 Introduction Existing approaches to in-network aggregation: Tree –based approach  Answer is generated by performing in-net aggregation along the tree  Proceed level by level from leaves  Exact computation  Suffer from high communication failures –“Not uncommon to loose 80% of readings”.

Xingbo YuICS280sensors, Winter 2005 Introduction Multi-path approach  Use wireless broadcast medium  Broadcast partial results to multiple neighbors  Use topology called rings. –Nodes divided into levels according to hop count from BS –Aggregation performed level by level up to the BS.  Each reading is accounted for multiple times –Robust  Suffer from: approximate answers and long message size

Xingbo YuICS280sensors, Winter 2005 Approach Comparison

Xingbo YuICS280sensors, Winter 2005 Tributary-Delta overview Combine the two approaches Adapting the aggregation to the current loss rate Low loss: trees are used  for low/zero approximate error and small size High loss: multi-path  For robustness

Xingbo YuICS280sensors, Winter 2005 Challenges How do nodes decide whether to use tree or multi-path How do the nodes using different approaches communicate How do the nodes convert partial results when transitioning between approaches New algorithm for finding frequent items

Xingbo YuICS280sensors, Winter 2005 More on multi-path To construct a rings topology BS transmits and any node hearing the transmission is in ring 1 Nodes in ring I transmit and any node hearing the transmission, but not already in a ring, is in ring I+1. All level I nodes that hear a level i+1 partial result incorporate the result into its own result Low communication error

Xingbo YuICS280sensors, Winter 2005 More on multi-path Special technique to avoid double-counting: synopsis (sketches) diffusion Synopsis generation: takes a stream of local sensor readings at a node and produces a partial result-synopsis Synopsis fusion: takes two synopses and generate a new one Synopsis evaluation: translates a synopsis into a query answer

Xingbo YuICS280sensors, Winter 2005 More on multi-path Example: count distinct items Let n by upper bound of the count h() be a hash function from sensor ids to [1, … lg(n)] SG function produces a bit vector of all 0’s and the sets the h(i)’th bit to 1 when see an id of i. SF function is OR function SE function takes a bit vector and output 2^(j- 1)/ , where j is the index of the lowest-order UNSET bit.

Xingbo YuICS280sensors, Winter 2005 Tributary-Delta View aggregation as a directed graph Nodes and BS are vertices Directed edge fro successful transmission Vertex labeled either M or T, for multi-path or tree Edge labeled based on source vertex The labels may change

Xingbo YuICS280sensors, Winter 2005 Tributary-Delta Correctness criteria of topology construction No two M vertices with partial results representing an overlapping set of sensors are connected to T vertices. Restrict to: a node receiving from an M node uses M scheme Edge correctness: An M edge can never be incident on a T vertex Path correctness: in any directed path in G, a T edge can never appear after an M edge

Xingbo YuICS280sensors, Winter 2005 Tributary-Delta Dynamic adaptation: An M vertex is switchable if all incoming edges are E edges, or no incoming edges (M1, M2) A T vertex is switchable if its parent is an M vertex or it has no parent. (T3, T4, T5) Let G’ be the connected component of G that includes the BS “if the set of T vertices in G’ is not empty, at least one of them is switchable. If the set of M vertices in G’ is not empty, at least one of them is switchable”

Xingbo YuICS280sensors, Winter 2005 Adaptation design User specify a threshold on the minimum percentage of nodes that should contribute to the aggregate answer Depending on the % of nodes contributing to the current result, the BS decides whether to shrink or expand the delta region for future result Increasing delta region increases the % contributing Key concern in switching nodes between tree and multi- path aggregation: transmitting and receiving synchronization Design choice: (to ensure switched nodes can retain current epoch) From M to T: must choose its parents from one of its neighbors in level i-1. From T to M: transmits to all neighbors in level i-1

Xingbo YuICS280sensors, Winter 2005 Adaptation strategies TD-coarse: if the % is below the user-specified threshold, all the current switchable T nodes is switched. TD: each switchable M node includes in its outgoing messages an additional field : number of nodes in sub-tree not contributing. Max and min of such number are maintained If % is below threshold: BS expands the delta region by switching from T to M all children of swichable M nodes beloning to a sub-tree that has max nodes not contributing When shrinking: switch each swichable M node whose subtree has only min nodes not contributing. ? Trade-off: higher convergence time. (will it converge?)

Xingbo YuICS280sensors, Winter 2005 Identify frequent items The problem: Each of m sensor nodes generates a collection of items. Given a user-supplied error tolerancee, the toal is to obtain from each item u, an e-deficient count c’(u) at the BS:  Max {0, c(u)-e*N} <= c’(u) <= c(u) Where N = sum(c(u))

Xingbo YuICS280sensors, Winter 2005 Identify frequent items–tree algorithm Partial result sent by a node X to its parent is a summary: S = Each c’(u) satisfies max {0, c(u)-e*N} <= c’(u) <= c(u) Approach is to distribute the e among intermediate nodes in the tree. Make e(i) a function of height of a node (height of a leaf node is 1) For correctness: e(1)<= e(2) <=… <= e(h)  As long as e(h) <= e, user guarantee is met.  Called precision gradient At each node: summary of items with count at most e*N is dropped.

Xingbo YuICS280sensors, Winter 2005 Identify frequent items–tree algorithm

Xingbo YuICS280sensors, Winter 2005 Min Total-Load algorithm D-dominating tree: fro any d>=1, we say that a tree is d-dominating if for any i>=1, H(i)>=(d-1)/d*(1+1/d+…+1/d^(i-1)) Where H(i)=1/m*SUM(h(j)), with h(j) being the number of nodes at height j, and m the total number of nodes. If a tree is d-dominating but not d+delta- dominating, refer to d as the domination factor.

Xingbo YuICS280sensors, Winter 2005 Min Total-Load algorithm Lemma: for any d-dominating tree of m nodes, where d>1, a precision gradient setting of e(i)=e*(1-t)(1+t+…+t^(i-1)) with t=1/sqrt(d) limits total communication to (1+ 2/(sqrt(d)-1))*m/e. Follows from: step 3 of alg. 1, at most 1/(e(i)-e(i-1)) items are sent by a node at height i to its parent

Xingbo YuICS280sensors, Winter 2005 Min Total-Load algorithm Lemma: a tree in which each internal node of height I has at least d children of height i-1 is d-dominating Construction of topology with large dominating factors: Each node of height i+1, if has two or more children of heigh I, pins down any two of its children so that they can not switch parents, and flag itself. Non-pinned nodes in each level j switch parents randomly to any other reachable non-flagged node in level j-1. As soon as a non-flagged node has at least two flagged children of the same height, it pins both of them and the flags itself. This makes the tree 2-dominating.

Xingbo YuICS280sensors, Winter 2005 Identify frequent items–multi-path algorithm Replace the + operator with duplicate- insensitive addition operators Synopsis generation, fusion, and evaluation all depend on what duplicate-insensitive addition algorithm is used.

Xingbo YuICS280sensors, Winter 2005 Results

Xingbo YuICS280sensors, Winter 2005 Results