Data centric Storage In Sensor networks Based on Balaji Jayaprakash’s slides.

Slides:



Advertisements
Similar presentations
1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
Advertisements

Directed Diffusion for Wireless Sensor Networking
Sensor Data Management Egemen Tanin Department of Computer Science and Software Engineering University of Melbourne.
A Presentation by: Noman Shahreyar
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed slides from Richard Yang.
1 Data-Centric Storage in Sensornets with GHT, A Geographic Hash Table Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin, Li.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks WSN Routing II 21 March 2005.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Schenker Presented by Greg Nims.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Small-world Overlay P2P Network
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
1 Next Century Challenges: Scalable Coordination in sensor Networks MOBICOMM (1999) Deborah Estrin, Ramesh Govindan, John Heidemann, Satish Kumar Presented.
An Energy-Efficient Data Storage Scheme for Multi- resolution Query in Wireless Sensor Networks 老師 : 溫志煜 學生 : 官其瑩.
Data Centric Storage using GHT Lecture 13 October 14, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor Networks Andreas Savvides.
1-1 CMPE 259 Sensor Networks Katia Obraczka Winter 2005 Storage and Querying II.
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker A Scalable, Content- Addressable Network (CAN) ACIRI U.C.Berkeley Tahoe Networks.
1 Data-Centric Storage in Sensornets Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin ICSI/UCB/USC/UCLA Presenter: Vijay Sundaram.
Multi-dimensional Range Query in Sensor Networks Xin Li,Young Jim Kim, Ramesh Govindan (University of Southern California ) Wei Hong (Intel Research Lab.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
Building Efficient Wireless Sensor Networks with Low-Level Naming Presented by Ke Liu CS552, Fall 2002 Binghamton University J. Heidemann, F. Silva, C.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
UNIVERSITY OF SOUTHERN CALIFORNIA Embedded Networks Laboratory 1 Wireless Sensor Networks Ramesh Govindan Lab Home Page:
Matching Data Dissemination Algorithms to Application Requirements John Heidermann, Fabio Silva, Deborah Estrin Presented by Cuong Le (CPSC538A)
1 A Scalable Content- Addressable Network S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker Proceedings of ACM SIGCOMM ’01 Sections: 3.5 & 3.7.
Data-Centric Storage in Sensornets Submitted to Sigcomm 2002 Authors: Sylvia Ratnasamy et al. ICIR, UCLA, UC-Berkeley Presenter:Shang-Chieh Wu
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
1 GPSR: Greedy Perimeter Stateless Routing for Wireless Networks B. Karp, H. T. Kung Borrowed some Richard Yang‘s slides.
Distributed Quad-Tree for Spatial Querying in Wireless Sensor Networks (WSNs) Murat Demirbas, Xuming Lu Dept of Computer Science and Engineering, University.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Load Balancing Routing Scheme in Mars Sensor Network CS 215 Winter 2001 Term Project Prof : Mario Gerla Tutor: Xiaoyan Hong Student : Hanbiao Wang & Qingying.
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
Ad hoc and Sensor Networks Routing protocols (Part II)
1 A scalable Content- Addressable Network Sylvia Rathnasamy, Paul Francis, Mark Handley, Richard Karp, Scott Shenker Pirammanayagam Manickavasagam.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Load Balancing of In-Network Data-Centric Storage Schemes in Sensor Networks Mohamed Aly In collaboration with Kirk Pruhs and Panos K. Chrysanthis Advanced.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
Decomposing Data-Centric Storage Query Hot-Spots in Sensor Netwokrs Mohamed Aly, Panos K. Chrysanthis, and Kirk Pruhs University of Pittsburgh Proceeding.
Computer Science 1 CSC 774 Advanced Network Security Distributed detection of node replication attacks in sensor networks (By Bryan Parno, Adrian Perrig,
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006.
Zone Sharing: A Hot-Spots Decomposition Scheme for Data-Centric Storage in Sensor Networks Mohamed Aly Nicholas Morsillo Panos K. Chrysanthis Kirk Pruhs.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Geo Location Service CS218 Fall 2008 Yinzhe Yu, et al : Enhancing Location Service Scalability With HIGH-GRADE Yinzhe Yu, et al : Enhancing Location Service.
Location Directory Services Vivek Sharma 9/26/2001 CS851: Large Scale Deeply Embedded Networks.
Data Dissemination in Sensor Networks Challenges and Solutions by Sovrin Tolia.
STDCS: A Spatio-Temporal Data-Centric Storage Scheme For Real-Time Sensornet Applications Mohamed Aly (University of Pittsburgh & Yahoo, Inc.) In collaboration.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
Query-based wireless sensor storage management for real time applications Ravinder Tamishetty, Lek Heng Ngoh, and Pung Hung Keng Proceedings of the 2006.
EASE: An Energy-Efficient In-Network Storage Scheme for Object Tracking in Sensor Networks Jianliang Xu Department of Computer Science Hong Kong Baptist.
KDDCS: A Load-Balanced In- Network Data-Centric Storage Scheme for Sensor Networks Mohamed Aly In collaboration with Kirk Pruhs and Panos K. Chrysanthis.
Distributed P2P Protocols Gabber-Galil overlay network for data storage in sensor networks.
Routing protocols for sensor networks.
Introduction to Wireless Sensor Networks
GPSR Greedy Perimeter Stateless Routing
Sensor Network Routing – III Network Embedded Routing
Outline Ganesan, D., Greenstein, B., Estrin, D., Heidemann, J., and Govindan, R. Multiresolution storage and search in sensor networks. Trans. Storage.
Presentation transcript:

Data centric Storage In Sensor networks Based on Balaji Jayaprakash’s slides

Overview of the Seminar Introduction Keywords and Terminology Existing Schemes Why Data centric Storage? Assumptions Geographic Hash table Comparitive Study Conclusion

Introduction Sensornet ♦ A distributed network comprised of a large number of small sensing devices equipped with Computation Communication Storage ♦ Great volume of data Data Dissemination Algorithm ♦ Energy efficient ♦ Scalable ♦ Self-organizing

Keywords and Terminology Observation ♦ low-level readings from sensors ♦ e.g. Detailed temperature readings Events ♦ Predefined constellations of low-level observations ♦ e.g. temperature greater than 75 F Queries ♦ Used to elicit information from sensor network

Total Usage /Hotspot Usage Total Usage Total number of packets sent in the Sensor network Hotspot Usage The maximal number of packets send by a particular sensor node

Existing schemes for Storage External Storage (ES) Local Storage (LS) Data Centric Storage (DCS)

External Storage (ES) External storage event

Local Storage (LS) event

Why do we need DCS? Scalability Robustness against Node failures and Node mobility To achieve Energy-efficiency

Assumptions in DCS Large Scale networks whose approximate geographic boundaries are known Nodes have short range communication and are within the radio range of several other nodes Nodes know their own locations by GPS or some localization scheme Communication to the outside world takes place by one or more access points

Data Centric Storage Relevant Data are stored by “name” at nodes within the Sensor network All data with the same general name will be stored at the same sensor-net node. e.g. (“elephant sightings”) Queries for data with a particular name are then sent directly to the node storing those named data

Data centric Storage Elephant Sighting source:lass.cs.umass.edu

Geographic Hash Table Events are named with keys and both the storage and the retrieval are performed using keys GHT provides (key, value) based associative memory

Geographic Hash Table Operations GHT supports two operations ♦ Put(k,v)-stores v (observed data) according to the key k ♦ Get(k)-retrieve whatever value is associated with key k Hash function ♦ Hash the key in to the geographic coordinates ♦ Put() and Get() operations on the same key “ k ” hash k to the same location

Storing Data in GHT Put (“elephant”, data) (12,24) Hash (‘elephant’)=(12,24) source:lass.cs.umass.edu

Retrieving data in GHT Get (“elephant”) Hash (‘elephant’)=(12,24) (12,24)

Geographic Hash Table Node A Node B

Algorithms Used By GHT Geographic hash Table uses GPSR for Routing ( Greedy Perimeter stateless routing ) PEER-TO-PEER look up system ( data object is associated with key and each node in the system is responsible for storing a certain range of keys )

Algorithm (Contd) GPSR- Packets are marked with position of destinations and each node is aware of its position Greedy forwarding algorithm Perimeter forwarding algorithm A B A B

Home Node and Home perimeter In GHT packet is not addressed to specific node but only to a specific location, hence only perimeter mode is used The packet will traverse the entire perimeter that encloses the destination before being consumed at the home node (the node closest to destination)

Problems Robustness could be affected » Nodes could move (i.d. of Home node?) » Node failure can Occur » Deployment of new Nodes Not Scalable » Storage capacity of the home nodes » Bottleneck at Home nodes

Solutions to the problems Perimeter refresh protocol Structured Replication

Perimeter refresh protocol Replicates stored data for key k at nodes around the location to which k hashes, and ensures that one node is chosen consistently as the home node for that “K” –consistency & persistence By hashing keys, GHT spreads storage and communication load between different keys evenly throughout the sensornet

Perimeter Refresh Protocol E F B D A C L E D F C B L home Replica home Replica

Time Specifications Refresh time (T h ) Take over time (T t ) Death time (T d ) General rule T d >T h and T t >T h In GHT Td=3Th and Tt=2Th

Characteristics Of Refresh Packet Refresh packet is addressed to the hashed location of the key Every (T h ) secs the home node will generate refresh packet Refresh packet contains the data stored for the key and routed exactly as get() and put() operations Refresh packet always travels along the home perimeter

Structured Replication Too many events are detected then home node will become the hotspot of communication. Hierarchical decomposition of the key space Structured replication reduces the cost of storage and is useful for frequently detected events.

Comparative Study Comparison based on Cost Comparison based on Total usage and Hot spot usage

Assumptions in comparison Asymptotic costs of O(n) for floods and O( n) for point to point routing Event locations are distributed randomly Event locations are not known in advance No more than one query for each event type (Q –Queries in total) Assume access points to be the most heavily used area of the sensor network

Comparison based on Cost CostExternal storage (ES) Local storage (LS) Data-centric storage Cost for Storage O(n) 0 Cost for query 0 O(n) Cost for Response 0 O(n)

Comparison based on Hot-spot/Total Usage n - Number of nodes T - Number of Event types Q – Number Of Event types queried for D total – Total number of detected events D Q - Number of detected events for queries

DCS TYPES Normal DCS – Query returns a separate message for each detected event Summarized DCS – Query returns a single message regardless of the number of detected events (usually summary is preferred)

Comparison Study – contd.. ESLSDCS Total Hot spot

Observations from the Comparison DCS is preferable only in cases where Sensor network is Large There are many detected events and not all even types queried D total >>max(D q, Q)

Simulations To check the Robustness of GHT To compare the Storage methods in terms of total and hot spot usage

Simulation Setup ns-2 Node Density – 1node/256m 2 Radio Range – 40 m Number of Nodes -50,100,150,200 Mobility Rate -0,0.1,1m/s Query generation Rate -2qps Event types – 20 Events detected -10/type Refresh interval -10 s

Performance metrics Availability of data stored to Queriers (In terms of success rate) Loads placed on the nodes participating in GHT (hotspot usage)

Simulation Results for Robustness GHT offers perfect availability of stored events in static case It offers high availability when nodes are subjected to mobility and failures

Simulation Results under varying Q Number of nodes is constant= 10000

Simulation results under varying N Number of Queries Q =50

Simulation Results for comparison of 3- storage methods S-DCS have low hot-spot usage under varying “Q” S-DCS is has the lowest hot-spot usage under varying “n”

Conclusion Data centric storage entails naming of data and storing data at nodes within the sensor network GHT- hashes the key (events) in to geographical co-ordinates and stores a key-value pair at the sensor node geographically nearest to the hash GHT uses Perimeter Refresh Protocol and structured replication to enhance robustness and scalability DCS is useful in large sensor networks and there are many detected events but not all event types are Queried

REFERENCES Deepak Ganesan, Deborah Estrin, John Heidemann, Dimensions: why do we need a new data handling architecture for sensor networks?, ACM SIGCOMM Computer Communication Review, Volume 33 Issue 1, January 2003 Scott Shenker, Sylvia Ratnasamy, Brad Karp, Ramesh Govindan, Deborah Estrin, Data-centric storage in sensornets, ACM SIGCOMM Computer Communication Review, Volume 33 Issue 1, January 2003Dimensions: why do we need a new data handling architecture for sensor networks? Data-centric storage in sensornets Sylvia Ratnasamy, Brad Karp, Scott Shenker, Deborah Estrin, Ramesh Govindan, Li Yin, Fang Yu, Data-centric storage in sensornets with GHT, a geographic hash table, Mobile Networks and Applications, Volume 8 Issue 4, August 2003Data-centric storage in sensornets with GHT, a geographic hash table Chalermek Intanagonwiwat, Ramesh Govindan, Deborah Estrin, John Heidemann, Fabio Silva, Directed diffusion for wireless sensor networking, IEEE/ACM Transactions on Networking (TON), Volume 11 Issue, February 2003Directed diffusion for wireless sensor networking R. Govindan, J. M. Hellerstein, W. Hong, S. Madden, M. Franklin, S. Shenker, The Sensor Network as a Database, USC Technical Report No , September 2002 The Sensor Network as a Database