Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University.

Slides:



Advertisements
Similar presentations
Multicasting in Mobile Ad hoc Networks By XIE Jiawei.
Advertisements

A Generic Framework for Monitoring Continuous Spatial Queries over Moving Objects.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
Ranveer Chandra , Kenneth P. Birman Department of Computer Science
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
On Reducing Communication Cost for Distributed Query Monitoring Systems. Fuyu Liu, Kien A. Hua, Fei Xie MDM 2008 Alex Papadimitriou.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
1 SINA: Scalable Incremental Processing of Continuous Queries in Spatio-temporal Databases Mohamed F. Mokbel, Xiaopeng Xiong, Walid G. Aref Presented by.
1 Efficient Retrieval of User Contents in MANETs Marco Fiore, Claudio Casetti, Carla-Fabiana Chiasserini Dipartimento di Elettronica, Politecnico di Torino,
MANETs A Mobile Ad Hoc Network (MANET) is a self-configuring network of mobile nodes connected by wireless links. Characteristics include: no fixed infrastructure.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kien A. Hua University of Central Florida. Overview  Background - Location-based services & challenges  Range Query in Open Space  Dynamic Range Query.
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Object Naming & Content based Object Search 2/3/2003.
Di Wu 03/03/2011 Geographic Routing in Clustered Multi-layer Vehicular Ad Hoc Networks for Load Balancing Purposes.
Anonymous Gossip: Improving Multicast Reliability in Mobile Ad-Hoc Networks Ranveer Chandra (joint work with Venugopalan Ramasubramanian and Ken Birman)
Adaptive Web Caching Lixia Zhang, Sally Floyd, and Van Jacob-son. In the 2nd Web Caching Workshop, Boulder, Colorado, April 25, System Laboratory,
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
August 6, Mobile Computing COE 446 Network Planning Tarek Sheltami KFUPM CCSE COE Principles of.
Client-Server Computing in Mobile Environments
Network Topologies.
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
Itrat Rasool Quadri ST ID COE-543 Wireless and Mobile Networks
SAvPS – úvod Genči 2009 (bsaed on Tanenbaum’s slides.
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
1 Spring Semester 2009, Dept. of Computer Science, Technion Internet Networking recitation #3 Mobile Ad-Hoc Networks AODV Routing.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
Phero-Trail: A Bio-Inspired Location Service for Mobile Underwater Sensor Networks Luiz Filipe M. Vieira †, Uichin Lee ‡ and Mario Gerla * † Department.
Wireless Ad-Hoc Networks
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
A survey of Routing Attacks in Mobile Ad Hoc Networks Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, Nei Kato, and Abbas Jamalipour Presented.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Introduction to dCache Zhenping (Jane) Liu ATLAS Computing Facility, Physics Department Brookhaven National Lab 09/12 – 09/13, 2005 USATLAS Tier-1 & Tier-2.
Shape-based Similarity Query for Trajectory of Mobile Object NTT Communication Science Laboratories, NTT Corporation, JAPAN. Yutaka Yanagisawa Jun-ichi.
WIRELESS AD-HOC NETWORKS Dr. Razi Iqbal Lecture 6.
AD-HOC NETWORK SUBMITTED BY:- MIHIR GARG A B.TECH(E&T)/SEC-A.
Efficient Energy Management Protocol for Target Tracking Sensor Networks X. Du, F. Lin Department of Computer Science North Dakota State University Fargo,
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Energy conservation in Wireless Sensor Networks Sagnik Bhattacharya, Tarek Abdelzaher University of Virginia, Department of Computer Science School of.
DHT-based unicast for mobile ad hoc networks Thomas Zahn, Jochen Schiller Institute of Computer Science Freie Universitat Berlin 報告 : 羅世豪.
Ad Hoc Network.
An Efficient Wireless Mesh Network A New Architecture 指導教授:許子衡 教授 學生:王志嘉.
Scalable Routing Protocols for
Star Topology Star Networks are one of the most common network topologies. consists of one central switch, hub or computer, which acts as a conduit to.
Range Monitoring Queries in Location-based Services Kien A. Hua School of EECS University of Central Florida.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Overview of Cellular Networks Mobile Ad hoc Networks Sensor Networks.
A Two-Tier Heterogeneous Mobile Ad Hoc Network Architecture and Its Load-Balance Routing Problem C.-F. Huang, H.-W. Lee, and Y.-C. Tseng Department of.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Alexander Smithson, Dian Ding, Yeh Cheng Yuan Graduate Advisor: Eric Liao Faculty.
Lecture 8: Wireless Sensor Networks By: Dr. Najla Al-Nabhan.
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications * CS587x Lecture Department of Computer Science Iowa State University *I. Stoica,
Mobile Ad Hoc Networking By Shaena Price. What is it? Autonomous system of routers and hosts connected by wireless links Can work flawlessly in a standalone.
Presented by Edith Ngai MPhil Term 3 Presentation
Overview of Wireless Networks:
Ad-hoc Networks.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
CSE 4340/5349 Mobile Systems Engineering
Mobile ad hoc networking: imperatives and challenges
DATA RETRIEVAL IN ADHOC NETWORKS
Continuous Density Queries for Moving Objects
Other Routing Protocols
Efficient Flooding Techniques for Mobile Ad Hoc Networks
Presentation transcript:

Processing Monitoring Queries on Mobile Objects Lecture for COMS 587 Department of Computer Science Iowa State University

What is a mobile database? A mobile database is a set of mobile devices -Centralized: there exists a central server with which each mobile device can communicate -Decentralized: these devices form a network by themselves -Mobile ad hoc network (MANET) -Mesh networks

Characteristics Large number of mobile objects Continuous movement of mobile objects -Limited battery power -Limited communication bandwidth

Processing Range-Monitoring Query What is range-monitoring query? – Retrieve mobile objects in a spatial region, and – continuously monitor the population in the area

Range-Monitoring Queries a Q2Q2 Q1Q1 b c f d e

a Q2Q2 Q1Q1 b c f d e

Tourist guiding Automatic traffic control Digital battlefield vehicle tracking Wild animal tracking Some Potential Applications

How to minimize location updates? –Excessive mobile communication could drain battery power quickly How to minimize server processing cost? –Query results keep changing Research Issues

Related Works Location Estimation [Woflson98, Woflson99, etc.] Trajectory Indexing [Kollios99, Saltenis00, etc.] Safe Region Approach [Prabhakar00, Prabhakar01]

Q1Q1 Q5Q5 Q2Q2 Q4Q4 Safe Regions Q3Q3 Circular Safe Region Rectangular Safe Region a

Problems with Safe Regions Computing a safe region takes from O(n) to O(n log 3 n) Adding a new query requires to re- compute safe regions for all objects

How to provide –accurate query results, and –real-time updates? Challenge

Proposed: Monitoring-Query Management Q1Q1 Q2Q2 Q7Q7 Q6Q6 Q3Q3 Q5Q5 Q4Q4 a Resident Domain

Given an object’s position P and its processing capability N, its resident domain should Computing a Resident Domain – contain position P, and – be as large as possible, but – contain no more than N queries

Domain and Query Decomposition Q1Q1 Q4Q4 Q2Q2 Q3Q3 R1R1 R 42 R 21 R 31 R 22 R 41

Domain and Query Decomposition Q1Q1 Q4Q4 Q2Q2 Q3Q3 R1R1 R 42 R 21 R 31 R 22 R 41 a

Domain and Query Decomposition Q1Q1 Q4Q4 Q2Q2 Q3Q3 R1R1 R 42 R 21 R 31 R 22 R 41 a

Domain Tree (D-tree) D D domain node data node

D d1d1 d1d1 d2d2 d2d2 Domain Tree (D-tree)

d1d1 d1d1 d2d2 d 21 d 22 d 21 d 22 D Domain Tree (D-tree)

Mobile Communication Cost Number of messages sent by mobile objects (millions) Number of monitoring queries (thousands) MQM Safe Region

Server Processing Cost Number of index nodes accessed (millions) Number of monitoring queries (thousands) MQM Safe Region

Significant and Impact of MQM MQM is the first scalable technique, in terms of mobile communication and server processing costs, for real-time range- monitoring query management

Mobile Range Monitoring Queries (M-RMQ) A M-RMQ retrieves the mobile objects within a range centered on a mobile object It is associated with a mobile object called focal node The movement of the focal node and other mobile objects may lead to the change of query results

Proposed: MobiEye The network domain is divided into a number of grid cells Each focal node reports its velocity to the server and update when such information changes Each query window is associated with a bounding box All nodes within a bounding box are notified of the velocity of the query When a node detects that its moves into/out of a bounding box, report to the server

Decentralized Mobile Database Management Mobile ad hoc networks  A set of mobile objects form a network by themselves  The communications among these objects are done through packet relaying Without relying on any fixed infrastructures Low cost and easy setup (great for battlefields)  Many protocols have been developed for efficient routing discovery and communications a b c f d e g h

Handling Stationary Range Monitoring Queries Key research issue: where the queries are stored  Solution 1: each node keeps a copy of each query  Great for query evaluation  Expensive for query installation and removal  Solution 2: each node keeps only the queries it issues  Great for query installation and removal  Expensive for query evaluation a b c f d e g h

Handling Stationary Range Monitoring Queries Network partitioning Each node caches all queries relevant to its home cell While moving inside a cell, a node monitors its movement against the queries it knows if crossing over any boundary, update the query issuer What happens when moving into/out of a cell?

Handling Stationary Range Monitoring Queries Network partitioning Each node caches all queries relevant to its home cell While moving inside a cell, a node monitors its movement against the queries it knows if crossing over any boundary, update the query issuer What happens when moving into/out of a cell?

Handling Stationary Range Monitoring Queries When moving out of its cell, a node checks if it is the last node No - remove the queries Yes – keep the queries, the node becomes the retaining node to the cell When moving into a new cell, a node retrieves the new relevant queries either from any node in the cell, or from the cell’s retaining node

Handling Stationary Range Monitoring Queries Searching for a retaining node can be done by expanding the search range step by step A cell’s retaining node may move far away from the cell Keep the queries in a node that is close to the cell Compute the distance whenever moving into a new cell, and if necessary, unload the queries to some nearby node

Handling Mobile Range Monitoring Queries

Concept of safe boundary

Handling Mobile Range Monitoring Queries Concept of safe boundary

Handling Stationary KNN queries

Handling Mobile KNN queries

Questions Any other types of queries? Can any type of queries be converted into one or more stationary range monitoring queries?