Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 12: Data-centric and content-based networking Holger Karl.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Directed Diffusion for Wireless Sensor Networking
COS 461 Fall 1997 Routing COS 461 Fall 1997 Typical Structure.
HIERARCHY REFERENCING TIME SYNCHRONIZATION PROTOCOL Prepared by : Sunny Kr. Lohani, Roll – 16 Sem – 7, Dept. of Comp. Sc. & Engg.
Interest Management Objectives – –Understand what is meant by the term interest management. –Realise how interest management schemes may be deployed. –Understand.
SENSOR NETWORKS ECE 654 Irene Ioannou. Sensor networks communication architecture.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture Christian Schindelhauer.
1 Routing Techniques in Wireless Sensor networks: A Survey.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
DIRECTED DIFFUSION. Directed Diffusion Data centric A node request data by sending interest for named data Data matching interest is drawn toward that.
1 Sensor Relocation in Mobile Sensor Networks Guiling Wang, Guohong Cao, Tom La Porta, and Wensheng Zhang Department of Computer Science & Engineering.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 25th Lecture Christian Schindelhauer.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
1 Complexity of Network Synchronization Raeda Naamnieh.
Scribe: A Large-Scale and Decentralized Application-Level Multicast Infrastructure Miguel Castro, Peter Druschel, Anne-Marie Kermarrec, and Antony L. T.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 24th Lecture Christian Schindelhauer.
588 Section 6 Neil Spring May 11, Schedule Notes – (1 slide) Multicast review –(3slides) RLM (the paper you didn’t read) –(3 slides) ALF & SRM –(8.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
Aggregation in Sensor Networks NEST Weekly Meeting Sam Madden Rob Szewczyk 10/4/01.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
Matching Data Dissemination Algorithms to Application Requirements John Heidermann, Fabio Silva, Deborah Estrin Presented by Cuong Le (CPSC538A)
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Wireless Distributed Sensor Networks Special Thanks to: Jasvinder Singh Hitesh Nama.
P2P Course, Structured systems 1 Introduction (26/10/05)
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
Spanning Tree and Multicast. The Story So Far Switched ethernet is good – Besides switching needed to join even multiple classical ethernet networks Routing.
Network Kernel Architectures and Implementation ( ) Naming and Addressing Chaiporn Jaikaeo Department of Computer Engineering.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
College of Engineering Non-uniform Grid- based Coordinated Routing Priyanka Kadiyala Major Advisor: Dr. Robert Akl Department of Computer Science and Engineering.
Network Kernel Architectures and Implementation ( ) Network Architecture Chaiporn Jaikaeo Department of Computer Engineering.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Sensor Network Databases1 Overview: Chapter 6  Sensor Network Databases  Sensor networks are conceptually a distributed DB  Store collected data  Indexes.
March 6th, 2008Andrew Ofstad ECE 256, Spring 2008 TAG: a Tiny Aggregation Service for Ad-Hoc Sensor Networks Samuel Madden, Michael J. Franklin, Joseph.
Higashino Lab. Maximizing User Gain in Multi-flow Multicast Streaming on Overlay Networks Y.Nakamura, H.Yamaguchi and T.Higashino Graduate School of Information.
Mohmmad Khalily Dermany Islamic Azad University. Goal Apart from routing protocols that use a direct identifier of nodes (either unique id or position.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Content Addressable Network CAN. The CAN is essentially a distributed Internet-scale hash table that maps file names to their location in the network.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
Network Kernel Architectures and Implementation ( ) Data-Centric and Content-Based Networking Chaiporn Jaikaeo Department of.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 7: Naming & Addressing Holger Karl.
Information-Centric Networks10b-1 Week 10 / Paper 2 Hermes: a distributed event-based middleware architecture –P.R. Pietzuch, J.M. Bacon –ICDCS 2002 Workshops.
Peer to Peer Network Design Discovery and Routing algorithms
Session 1 Module 1: Introduction to Data Integrity
Chapter 7: Consistency & Replication IV - REPLICATION MANAGEMENT By Jyothsna Natarajan Instructor: Prof. Yanqing Zhang Course: Advanced Operating Systems.
Peter R Pietzuch and Jean Bacon Peer-to-Peer Overlay Networks in an Event-Based Middleware DEBS’03, San Diego, CA, USA,
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Ad Hoc On-Demand Distance Vector Routing (AODV) ietf
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Presented by Barath Raghavan.
SPIN: Sensor Protocols for Information via Negotiation
Ad hoc and Sensor Networks Chapter 12: Data-centric and content-based networking Holger Karl.
Protocols for Wireless Sensor Networks
Introduction to Wireless Sensor Networks
DIRECTED DIFFUSION.
Wireless Sensor Network Architectures
Mobile and Wireless Networking
DIRECTED DIFFUSION.
Data-Centric Networking
Presentation transcript:

Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 12: Data-centric and content-based networking Holger Karl

2 Goal of this chapter  Apart from routing protocols that use a direct identifier of nodes (either unique id or position of a node), networking can talk place based directly on content  Content can be collected from network, processed in the network, and stored in the network  This chapter looks at such content-based networking and data aggregation mechanisms

3 Overview  Interaction patterns and programming model  Data-centric routing  Data aggregation  Data storage

4 Desirable interaction paradigm properties  Standard networking interaction paradigms: Client/server, peer-to-peer  Explicit or implicit partners, explicit cause for communication  Desirable properties for WSN (and other applications)  Decoupling in space – neither sender nor receiver need to know their partner  Decoupling in time – “answer” not necessarily directly triggered by “question”, asynchronous communication

5 Interaction paradigm: Publish/subscribe  Achieved by publish/subscribe paradigm  Idea: Entities can publish data under certain names  Entities can subscribe to updates of such named data  Conceptually: Implemented by a software bus  Software bus stores subscriptions, published data; names used as filters; subscribers notified when values of named data changes Software bus Publisher 1Publisher 2 Subscriber 1Subscriber 2Subscriber 3  Variations  Topic-based P/S – inflexible  Content-based P/S – use general predicates over named data

6 Publish/subscribe implementation options  Central server – mostly not applicable  Topic-based P/S: group communication protocols  Content-based networking does not directly map to multicast groups  Needs content-based routing/forwarding for efficient networking t < 10 t > 20 t < 10 t 20 t > 20 t > 30 t > 20 t 20 t = 35!

7 Overview  Interaction patterns and programming model  Data-centric routing  Data aggregation  Data storage

8 One-shot interactions with big data sets  Scenario  Large amount of data are to be communicated – e.g., video picture  Can be succinctly summarized/described  Idea: Only exchange characterization with neighbor, ask whether it is interested in data  Only transmit data when explicitly requested  Nodes should know about interests of further away nodes ! Sensor Protocol for Information via Negotiation (SPIN)

9 SPIN example ADV REQ DATA (1)(2)(3) (4)(5)(6) ADV REQ DATA

10 Repeated interactions  More interesting: Subscribe once, events happen multiple times  Exploring the network topology might actually pay off  But: unknown which node can provide data, multiple nodes might ask for data ! How to map this onto a “routing” problem?  Idea: Put enough information into the network so that publications and subscriptions can be mapped onto each other  But try to avoid using unique identifiers: might not be available, might require too big a state size in intermediate nodes ! Directed diffusion as one option for implementation  Try to rely only on local interactions for implementation

11 Directed diffusion – Two-phase pull  Phase 1: nodes distribute interests in certain kinds of named data  Specified as attribute-value pairs (cp. Chapter 7)  Interests are flooded in the network  Apparently obvious solution: remember from where interests came, set up a convergecast tree  Problem: Node X cannot distinguish, in absence of unique identifiers, between the two situations on the right – set up only one or three convergecast trees? Sink 1 Sink 2 Sink 3 Source X Sink Source X

12 Direction diffusion – Gradients in two-phase pull  Option 1: Node X forwarding received data to all “parents” in a “convergecast tree”  Not attractive, many needless packet repetitions over multiple routes  Option 2: node X only forwards to one parent  Not acceptable, data sinks might miss events  Option 3: Only provisionally send data to all parents, but ask data sinks to help in selecting which paths are redundant, which are needed  Information from where an interest came is called gradient  Forward all published data along all existing gradients

13 Gradient reinforcement  Gradients express not only a link in a tree, but a quantified “strength” of relationship  Initialized to low values  Strength represents also rate with which data is to be sent  Intermediate nodes forward on all gradients  Can use a data cache to suppress needless duplicates  Second phase: Nodes that contribute new data (not found in cache) should be encouraged to send more data  Sending rate is increased, the gradient is reinforced  Gradient reinforcement can start from the sink  If requested rate is higher than available rate, gradient reinforcement propagates towards original data sources  Adapts to changes in data sources, topology, sinks

14 Directed diffusion – extensions  Two-phase pull suffers from interest flooding problems  Can be ameliorated by combining with topology control, in particular, passive clustering  Geographic scoping & directed diffusion  Push diffusion – few senders, many receivers  Same interface/naming concept, but different routing protocol  Here: do not flood interests, but flood the (relatively few) data  Interested nodes will start reinforcing the gradients  Pull diffusion – many senders, few receivers  Still flood interest messages, but directly set up a real tree

15 Overview  Interaction patterns and programming model  Data-centric routing  Data aggregation  Data storage

16 Data aggregation  Any packet not transmitted does not need energy  To still transmit data, packets need to combine their data into fewer packets ! aggregation is needed  Depending on network, aggregation can be useful or pointless

17 Metrics for data aggregation  Accuracy: Difference between value(s) the sink obtains from aggregated packets and from the actual value (obtained in case no aggregation/no faults occur)  Completeness: Percentage of all readings included in computing the final aggregate at the sink  Latency  Message overhead

18 How to express aggregation request?  One option: Use database abstraction of WSN  Aggregation is requested by appropriate SQL clauses  Agg(expr): actual aggregation function, e.g., AVG(temperature)  WHERE: filter on value before entering aggregation process  Usually evaluated locally on an observing node  GROUP BY: partition into subsets, filtered by HAVING  GROUP BY floor HAVING floor > 5

19 Partial state records  Partial state records to represent intermediate results  E.g., to compute average, sum and number of previously aggregated values is required – expressed as  Update rule:  Final result is simply s/c

20 Aggregation operations – categories  Duplicate sensitive, e.g., median, sum, histograms; insensitive: maximum or minimum  Summary or examplary  Composable: for f aggregation function, there exist g such that f(W) = g(f(W 1 ), f(W 2 )) for W = W 1 [ W 2  Behavior of partial state records  Distributive – end results directly as partial state record, e.g., MIN  Algebraic – p.s.r. has constant size; end result easily derived  Content-sensitive – size and structure depend on measured values (e.g., histogram)  Holistic – all data need to be included, e.g., median  Monotonic

21 Placement of aggregation points  Convergecast trees provide natural aggregation points  But: what are good aggregation points?  Ideally: choose tree structure such that the size of the aggregated dat to be communicated is minimized  Figuratively: long trunks, bushy at the leaves  In fact: again a Steiner tree problem in disguise  Good aggregation tree structure can be obtained by slightly modifying Takahashi-Matsuyama heuristic  Alternative: look at parent selection rule in a simple flooding-based tree construction  E.g., first inviter as parent, random inviter, nearest inviter, …  Result: no simple rule guarantees an optimal aggregation structure  Can be regarded as optimization problem as well

22 Alternative: broadcasting an aggregated value  Goal is to distribute an aggregate of all nodes’ measurements to all nodes in turn  Setting up |V| convergecast trees not appropriate  Idea: Use gossiping combined with aggregation  When new information is obtained, locally or from neighbor, compute new estimate by aggregation  Decide whether to gossip this new estimate, detect whether a change is “significant”

23 Overview  Interaction patterns and programming model  Data-centric routing  Data aggregation  Data storage

24 Data-centric storage  Problem: Sometimes, data has to be stored for later retrieval – difficult in absence of gateway nodes/servers  Question: Where/on which node to put a certain datum?  Avoid a complex directory service  Idea: Let name of data describe which node is in charge  Data name is hashed to a geographic position  Node closest to this position is in charge of holding data  Akin to peer-to-peer networking/distributed hash tables  Hence name of one approach: Geographic Hash Tables (GHT)  Use geographic routing to store/retrieve data at this “location” (in fact, the node)

25 Geographic hash tables – Some details  Good hash function design  Nodes not available at the hashed location – use “nearest” node as determined by a geographic routing protocol  E.g., the node where an initial packet started circulating the “hole”  Other nodes around hole are informed about node taking charge  Handling failing and new nodes  Failure detected by timeout, apply similar procedure as for initially storing data  Limited storage per node  Distribute data to other nodes on same face Key location Timeout New key location

26 Conclusion  Using data names or predicates over data to describe the destination of packets/data opens new options for networking  Networking based on such “data-centric addresses” nicely supports an intuitive programming model – publish/subscribe  Aggregation a key enabler for efficient networking  Other options – data storage, bradcasting aggregates – also well supportable