data centric query in sensor networks ii centric query in
play

Data- -Centric Query in Sensor Networks II Centric Query in Sensor - PowerPoint PPT Presentation

Data- -Centric Query in Sensor Networks II Centric Query in Sensor Networks II Data Jie Gao Computer Science Department Stony Brook University 1 Papers Papers Rik Sarkar, Xianjin Zhu, Jie Gao, Double Rulings for Information Brokerage in


  1. Data- -Centric Query in Sensor Networks II Centric Query in Sensor Networks II Data Jie Gao Computer Science Department Stony Brook University 1

  2. Papers Papers • Rik Sarkar, Xianjin Zhu, Jie Gao, Double Rulings for Information Brokerage in Sensor Networks , MobiCom’06. • Qing Fang, Jie Gao, Leonidas J. Guibas, Landmark- Based Information Storage and Retrieval in Sensor Networks , INFOCOM'06. 2

  3. Problem: Information Brokerage Problem: Information Brokerage • Information producers and information consumers need to find each-other. – Tourists in a park looking for animals, but sensors with animals in range do not know where tourists are. • Challenges – Content based search – Spatial/Temporal separation – Limited network resources • Easy solution : Flood – Inefficient 3

  4. Geographic Hash Tables Geographic Hash Tables • Data centric hashing. – Hashed node forms rendezvous – Enables brokerage • Pros – Simple, works without flooding • Cons – Nodes near hashed location become bottleneck. – Not distance-sensitive. Nearby producer and consumer may hash to far away nodes. 4

  5. Another approach: Double Rulings Another approach: Double Rulings • Hash data to a 1-d curve, instead of a 0-d point • Motivations for generalization – Data delivery uses multi-hop routing • Leave information along route at no extra cost – More flexible data retrieval • Easier to encounter a 1-d curve than a 0-d point 5

  6. Simple Double Ruling Simple Double Ruling • Rectilinear Double Ruling – Producer stores data on horizontal lines – Consumer searches along vertical lines – Correctness : Every horizontal line intersects every vertical line – Distance sensitive: q finds p in time O(d), where d=|pq|. References: [Liu Huang Zhang 04], Rumor routing [Barginsky-Estrin 02], Quorum- based routing [Stojmenovic99]. 6

  7. Spherical Double Rulings Scheme Spherical Double Rulings Scheme • Producer follows a circle to the hashed location – Includes GHT as a sub-case – Allows a large variety of retrieval mechanisms • Improves on GHT – Load balancing for popular data types – Distance sensitivity – Flexible data retrieval schemes improve system robustness 7

  8. Double Rulings Rulings on a Sphere Double on a Sphere • Stereographic projection maps a projective plane to a sphere – Circles map to circles – May incur distortion • For a finite sensor field – Can choose location and size of sphere such that distance distortion is bounded by 1+ ε . 8

  9. Spherical Double Rulings Spherical Double Rulings • Any two great circles intersect – Use great circles in place of vertical/horizontal lines 9

  10. Spherical Double Rulings Spherical Double Rulings • One major difference with rectilinear double rulings: – Infinitely many great circles through a point – A lot more flexibility 10

  11. Data Replication Data Replication • Data centric hash function h(T i )=h i . • Producer p replicates data along the great circle C(p, h i ) . 11

  12. Data Replication Data Replication • Different producers with the same data type hash to different great circles, all passing through , and its antipodal point . h h – Allow aggregation. 12

  13. Replication Curve Examples Replication Curve Examples Producer 2 Hashed node Antipode Replication curve GHT paths Producer 1 13

  14. Data Retrieval Data Retrieval • Flexible retrieval rules 1. GHT Style Retrieval 2. Distance Sensitive Retrieval 3. Aggregated Data Retrieval 4. Full Power Data Retrieval 14

  15. 1. GHT Style Retrieval 1. GHT Style Retrieval • GHT still works • Consumer q wants data T i Consumer goes to hashed node h or its Consumer goes to hashed node h or its antipodal, whichever is closer. antipodal, whichever is closer. 15

  16. 2. Distance Sensitive Retrieval 2. Distance Sensitive Retrieval • Distance Sensitive : If producer is at distance d from q , consumer should find data with cost O(d). – Consumes less network resources – Users are likely to be more interested in immediate vicinity. – Lower delay --- Important in emergency response. 16

  17. 2. Distance Sensitive Retrieval 2. Distance Sensitive Retrieval • Rotate the sphere so that hashed node is at the north pole. Retrieval along the ≤ ≤ d • π ≤ ≤ π /2 π π latitude curve |pq|=d Replication along the longitude curve If q is d away from p, the distance from q along latitude curve is ≤ ≤ d • π ≤ ≤ π /2. π π 17

  18. 2. Distance Sensitive Retrieval 2. Distance Sensitive Retrieval • Distance Sensitive : If producer is at distance d from q , consumer should find data with cost O(d). Consumer q follows the circle with fixed Consumer q follows the circle with fixed distance to the hashed location. distance to the hashed location. • Wrong direction ? – Handled using a doubling technique – A random choice of direction works well in practice (we use this in simulations). 18

  19. 2. Distance Sensitive Retrieval 2. Distance Sensitive Retrieval Hashed node Retrieval Antipode curve Consumer Producer 19

  20. 3. Aggregated Data Retrieval 3. Aggregated Data Retrieval • Consumer wants data of several Data Types { T i } – E.g., monkey & elephant detections. Follow a closed curve that separates h i and its Follow a closed curve that separates h i and its antipodal point, for each data type T i antipodal point, for each data type T i – Correctness: Any closed cycle that separates h i from its antipodal intersects the producer curve. – Many such retrieval curves! � more freedom for consumers and better load balancing. 20

  21. 3. Aggregate Data Retrieval 3. Aggregate Data Retrieval Hashed node Antipode Retrieval curve Producer Consumer 21

  22. 4. Full Power Data Retrieval 4. Full Power Data Retrieval • Consumer wants all the data in the network Follow a great circle, retrieve all data. Follow a great circle, retrieve all data. – Correctness : Any two great circles intersect – Many such great circles! 22

  23. 4. Full Power Data Retrieval 4. Full Power Data Retrieval Hashed node Antipode Great Circle Retrieval Producer curve Consumer 23

  24. Local Data Recovery upon Node Local Data Recovery upon Node Failures Failures • When a group of nodes are destroyed, All the data on those nodes are All the data on those nodes are available on the boundary of destroyed available on the boundary of destroyed region. region. 24

  25. Local Data Recovery upon Node Local Data Recovery upon Node Failures Failures Survived Data Replicas on the boundary 25

  26. Implementation Implementation • How to forward data on a virtual curve ? – Use “Geographic Greedy forwarding on a Curve” Badri Nath and D. Niculescu. Routing on a curve. SIGCOMM Comput. Commun. Rev. , 2003. • The question of density – Is it always possible to forward ? – Simulation : A suitable 2-hop neighbor exists with high probability, for networks with avg degree ≥ 5. 26

  27. Simulation: Distance Sensitivity Simulation: Distance Sensitivity 4200 nodes with average degree 8 per node. GHT GLIDER scheme Spherical Double Ruling Distance Sensitivity of queries ������������������������������������������������������������������������� 27 ����������������������������������� INFOCOM !!"�

  28. Simulation: Storage/Retrieval Tradeoff Simulation: Storage/Retrieval Tradeoff Nodes on replication curve can store the data or a pointer to the actual data. Increasing Consumer cost Replication Interval Larger Replication Interval 28 Decreasing Storage Cost

  29. Simulation: Storage/Retrieval Tradeoff Storage/Retrieval Tradeoff Simulation: More storage, Lower retrieval cost. Replication only on the hashed node and antipode. 29

  30. Simulation: Load Balancing Simulation: Load Balancing 500 consumers querying a popular data item Number of messages through a node Double Ruling GHT Load Distribution 30

  31. Discussion Discussion • Data collection by mobile data mules. – Physically move along any retrieval curve. • Advanced hashing schemes. – E.g., similar data types are placed nearby. • Networks with holes. – Require special care. 31

  32. When sensors are not regular… … When sensors are not regular • Double rulings on an irregular shape. – Shape parameterization • Integrate double rulings with other approaches. 32

  33. Two- -level brokerage structure level brokerage structure Two • Recall GLIDER: landmark-based routing. • Partition the sensor field into tiles. – GHT on the tiles. – Double rulings inside each tile. 33

  34. Combinatorial Delaunay graph Combinatorial Delaunay graph • Select landmarks. • Landmarks flood the network. • Every node remember its closest landmark – landmark Voronoi diagram. • Construct Combinatorial Delaunay Triangulation (CDT) on landmarks 34

  35. Double- -ruling and Geometry ruling and Geometry Double • In general, double-ruling requires geometry of sensor layout. • Previous work use geographic information. • The CDT captures spatial adjacency information of a landmark with respect to its neighboring landmarks, hence enabling double-ruling at a local scale. 35

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend