Center for E-Business Technology Seoul National University Seoul, Korea Collaborative joins in a pervasive computing environment Filip Perich, Anupam Joshi,

Slides:



Advertisements
Similar presentations
A Multi Agent Architecture for Tourism Recommendation
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
FIPA Interaction Protocol. Request Interaction Protocol Summary –Request Interaction Protocol allows one agent to request another to perform some action.
CSLI 5350G - Pervasive and Mobile Computing Week 3 - Paper Presentation “RPB-MD: Providing robust message dissemination for vehicular ad hoc networks”
Experiments on Query Expansion for Internet Yellow Page Services Using Log Mining Summarized by Dongmin Shin Presented by Dongmin Shin User Log Analysis.
Improving TCP Performance over Mobile Ad Hoc Networks by Exploiting Cross- Layer Information Awareness Xin Yu Department Of Computer Science New York University,
Gaia: A Middleware Platform for Active Spaces Summarized by Dongjoo Lee, IDS Lab., Seoul National University.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
OASIS Reference Model for Service Oriented Architecture 1.0
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Quality of Service in IN-home digital networks Alina Albu 23 October 2003.
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
CS335 Networking & Network Administration Tuesday, April 20, 2010.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Design of Cooperative Vehicle Safety Systems Based on Tight Coupling of Communication, Computing and Physical Vehicle Dynamics Yaser P. Fallah, ChingLing.
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models Pei’en LUO.
1 RTCWEB interim Remote recording use case / requirements John Elwell.
An Intelligent Broker Architecture for Context-Aware Systems A PhD. Dissertation Proposal in Computer Science at the University of Maryland Baltimore County.
Research Meeting Seungseok Kang Center for E-Business Technology Seoul National University Seoul, Korea.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment Dewan Tanvir Ahmed and Shervin Shirmohammadi Distributed & Collaborative Virtual.
Automatically Identifying Localizable Queries Center for E-Business Technology Seoul National University Seoul, Korea Nam, Kwang-hyun Intelligent Database.
Intelligent Agents Meet the Semantic Web in Smart Spaces Harry Chen,Tim Finin, Anupam Joshi, and Lalana Kagal University of Maryland, Baltimore County.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
IEEE R lmap 23 Feb 2015.
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications Harry Chen, Filip Perich, Tim Finin, Anupam Joshi Department of Computer Science & Electrical.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
Network: Location Management Y. Richard Yang 3/21/2011.
A service-oriented middleware for building context-aware services Center for E-Business Technology Seoul National University Seoul, Korea Tao Gu, Hung.
Implementing a Sentient Computing System Presented by: Jing Lin, Vishal Kudchadkar, Apurva Shah.
, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Reliable Broadcast for WBAN] Date Submitted:
Researchers: Preet Bola Mike Earnest Kevin Varela-O’Hara Han Zou Advisor: Walter Rusin Data Storage Networks.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Center for E-Business Technology Seoul National University Seoul, Korea BrowseRank: letting the web users vote for page importance Yuting Liu, Bin Gao,
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
Personalized Search Xiao Liu
1 Vigil : Enforcing Security in Ubiquitous Environments Authors : Lalana Kagal, Jeffrey Undercoffer, Anupam Joshi, Tim Finin Presented by : Amit Choudhri.
Collaborative Filtering versus Personal Log based Filtering: Experimental Comparison for Hotel Room Selection Ryosuke Saga and Hiroshi Tsuji Osaka Prefecture.
SOA-based Collaborative Authoring Andrew Roczniak Multimedia Research Lab University of Ottawa.
A Collaborative and Semantic Data Management Framework for Ubiquitous Computing Environment International Conference of Embedded and Ubiquitous Computing.
Workshop on Future Learning Landscapes: Towards the Convergence of Pervasive and Contextual computing, Global Social Media and Semantic Web in Technology.
CASS – Middleware for Mobile Context-Aware Applications Patrick Fahy Siobhan Clarke Trinity College Dublin, Ireland Summarized by Babar Tareen,
Center for E-Business Technology Seoul National University Seoul, Korea Social Ranking: Uncovering Relevant Content Using Tag-based Recommender Systems.
Introduction to Semantic Web Service Architecture ► The vision of the Semantic Web ► Ontologies as the basic building block ► Semantic Web Service Architecture.
Visualizing QoS. Background(1/2) A tremendous growth in the development and deployment of networked applications such as video streaming, IP telephony,
Architectural Design of a Multi- Agent System for handling Metadata streams Don Cruickshank, Luc Moreau, David De Roure Department of Electronics and Computer.
Algorithmic, Game-theoretic and Logical Foundations
August 30, 2004STDBM 2004 at Toronto Extracting Mobility Statistics from Indexed Spatio-Temporal Datasets Yoshiharu Ishikawa Yuichi Tsukamoto Hiroyuki.
Introduction of Intelligent Agents
CoOL: A Context Ontology Language to Enable Contextual Interoperability Thomas Strang, Claudia Linnhoff-Popien, and Korbinian Frank German Aerospace Centor.
INRIA - Progress report DBGlobe meeting - Athens November 29 th, 2002.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Chapter 14 : Modeling Mobility Andreas Berl. 2 Motivation  Wireless network simulations often involve movements of entities  Examples  Users are roaming.
An Ontology-based Approach to Context Modeling and Reasoning in Pervasive Computing Dejene Ejigu, Marian Scuturici, Lionel Brunie Laboratoire INSA de Lyon,
February 4, Location Based M-Services Soon there will be more on-line personal mobile devices than on-line stationary PCs. Location based mobile-services.
Data Consolidation: A Task Scheduling and Data Migration Technique for Grid Networks Author: P. Kokkinos, K. Christodoulopoulos, A. Kretsis, and E. Varvarigos.
Is Context-Aware Computing Taking Control Away from the User? Three Levels of Interactivity Examined Louise Barkhuus and Anind Dey The IT University of.
Semantic Web in Context Broker Architecture Presented by Harry Chen, Tim Finin, Anupan Joshi At PerCom ‘04 Summarized by Sungchan Park
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Intelligent Agents: Technology and Applications Unit Five: Collaboration and Task Allocation IST 597B Spring 2003 John Yen.
A Fragmented Approach by Tim Micheletto. It is a way of having multiple cache servers handling data to perform a sort of load balancing It is also referred.
Network Topologies for Scalable Multi-User Virtual Environments Lingrui Liang.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
Mingze Zhang, Mun Choon Chan and A. L. Ananda School of Computing
On Data Management in Pervasive Computing Environments
1. INTRODUCTION.
Presentation transcript:

Center for E-Business Technology Seoul National University Seoul, Korea Collaborative joins in a pervasive computing environment Filip Perich, Anupam Joshi, Yelena Yesha, Tim Finin The VLDB Journal (2005) Summarized & presented by Babar Tareen, IDS Lab., Seoul National University

Copyright  2008 by CEBT Introduction  To obtains data Devices should not solely depend on centralized servers Devices should not be required to pre-cache all required data  A device should utilize its vicinity by collaborating with peers 2

Copyright  2008 by CEBT Introduction (2)  Data Static – User Profile Dynamic – Context Sensitive Data – Data which is affected by change in context – Not the actual context data – For example: List of restaurants near to a user  In this paper, context also includes Belief, Desire, Intentions Stored in user profile  Based on MoGATU 3

Copyright  2008 by CEBT Contribution  Collaborative Query Protocol (CQP) Based on Contract Nets Enables a mobile device to query its vicinity for peers that can answer a given query Allows two or more devices to cooperate  A realistic experimental model for simulating a city traffic scenario  Demonstrate the capability of CQP by implementing it in MoGATU and by evaluating its performance 4

Copyright  2008 by CEBT MoGATU Overview  Information Providers Represent Data sources available in environment  Information Consumers Entity that query an update data available in the environment  Information Managers (InforMa) Responsible for network communication and for most of the data management functions 5

Copyright  2008 by CEBT Data Representation  Data Model A set of ontologies  Define ontologies using DAML+OIL  Using ontologies because of reasoning  Do not take into account the time necessary for reasoning over the ontology knowledge 6

Copyright  2008 by CEBT Query Representation  Explicit Query User generated query  Implicit Query Device generated query, inferred from user profile User takes lunch between 12:00 pm – 2:00 pm and prefers Chinese food  Queries are specified in DAML-S  For this paper, abstracting queries to select-from-where form  query = (O, σ, θ,Σ, τ) O : A set of used ontologies σ : Selection list θ : Filtering statement Σ : Cardianality τ: Temporal constraints 7 SELECT (select_list) FROM (ontology_list) WHERE (conjunct_disjunct_predicate_list) LIMIT [minCardinality, maxCardinality] TIME neededBy

Copyright  2008 by CEBT CQP 8

CQP (2)  Call for query Initially device attempts to satisfy query using local cache If not possible, creates a call-for-query message Message contains – Query or part of query – Cardinality requirements – Deadline for delivering the complete answer – Time when the winner will be announced Device sends the message to its peers upto n-hops And Starts its bid-submission timer If device does not gets any bid-submission response then it starts to decompose the query 9

Copyright  2008 by CEBT CQP (3)  Bid Submission (Upon receipt of call-for-query) A device decides if it should interact in the proposed collaboration based on inference If device does not wishes to participate or can not provide data, it simply ignores call- for-query If device wishes to collaborate then it calculates the size of the answer it can provide Returns bid message including estimated size of its answer Starts a timer awaiting a bid-award  Bid Award Contractor waits for a predefined time period for any responses When bid submission timer expires, the bidder which claims to deliver the most data in shortest time is selected as winner Contractor sends a bid award message Starts Ack Timer If a bidder does not receives a bid-award message before its timer expires, the bidder resend its bid message n-1 more times 10

Copyright  2008 by CEBT CQP (4)  Acknowledgement When the bidder receives bid award message it sends back an ack message Starts an Ack timmer and waits for ack from Contractor When contractor receives ack from Bidder it send ack message 11

Copyright  2008 by CEBT Join Query over two streams  In case 1, querying device A asks its vicinity for one input stream only since it already holds the second stream.  In case 2, A asks its vicinity for the final join result only.  In case 3, A asks for each stream separately in order to perform the join locally.  In case 4, A asks B to process the query, but B needs to first obtain the second stream from some other device C.  In case 5, A “delegates” the task to C, which asks its vicinity for the input streams instead. 12

Copyright  2008 by CEBT Experimental Setup  Environment Realistic model that mapped streets and intersections south of 72 nd Street in Manhattan Directed graph with 793 intersections (vertices) 5000 x 9000 m Each intersection was assigned an (x,y) coordinate Each intersection was given a list of its neighboring intersections  Beacon entity Assigned a stationary beacon to each intersection Each beacon has knowledge about its vicinity (Resturants, Theaters, etc) 13

Copyright  2008 by CEBT Experimental Setup (2)  Car entity Use 100 cars Transmission distance 125 m Maximum throughput 2 Mbps  Mobility model Car driven randomly by tourists (50 Cars) Car driven by taxi driver on shortest possible route (50 Cars) 14

Copyright  2008 by CEBT Profile accuracy vs Query success rate  Fig 7a,b. a: Willingness to help = 0% b: Willingness to help = 75% 15

Copyright  2008 by CEBT Profile accuracy vs Computing Cost 16 Implicit Queries

Copyright  2008 by CEBT Willingness to help vs query success rate 17 Profile Accuracy 80%

Copyright  2008 by CEBT Willingness to help vs. computing and network cost 18 Profile Accuracy 80%

Copyright  2008 by CEBT Willingness to help vs. query success rate / computing cost 19 Profile Accuracy 80%

Copyright  2008 by CEBT Review  Pros CQP can be used to query data from multiple sources CQP can be used in any environment not just mobile peer – peer scenario  Cons CQP is not much useful if devices already have access to some fixed network More on discussion slide 20

Copyright  2008 by CEBT Discussion  Matrices used for evaluation are not appropriate No comparison with any existing system with similar architecture No comparison with centralized server architecture  Any technical problems in device – device communication not specified  In the example scenario, at every intersection beacons were installed Cost of installing such beacons not specified Enhancing centralized system vs. installing beacons  Only 100 cars were used in a space of 5000 x 9000 m What will be the performance of the protocol if number of devices increase  Cost of ontology reasoning not considered  I think there is a lot of packet over head for query and this protocol might not be practically usable  A combination of server and peer-peer querying might give better results 21