Is Your Car Talking with My Smart Phone? or Distributed Sensing and Computing in Mobile Networks Cristian Borcea Department of Computer Science, NJIT.

Slides:



Advertisements
Similar presentations
Symantec 2010 Windows 7 Migration EMEA Results. Methodology Applied Research performed survey 1,360 enterprises worldwide SMBs and enterprises Cross-industry.
Advertisements

Symantec 2010 Windows 7 Migration Global Results.
Design and Evaluation of an Autonomic Workflow Engine Thomas Heinis, Cesare Pautasso, Gustavo Alsonso Dept. of Computer Science Swiss Federal Institute.
1 Senn, Information Technology, 3 rd Edition © 2004 Pearson Prentice Hall James A. Senns Information Technology, 3 rd Edition Chapter 7 Enterprise Databases.
Computer Networks TCP/IP Protocol Suite.
1 UNIT I (Contd..) High-Speed LANs. 2 Introduction Fast Ethernet and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet Fibre Channel Fibre Channel High-speed.
1 Security for Ad Hoc Network Routing. 2 Ad Hoc Networks Properties Mobile Wireless communication Medium to high bandwidth High variability of connection.
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Distributed Systems Architectures
1 IEEE Media Independent Handoff Overview of services and scenarios for 3GPP2 Stefano M. Faccin Liaison officer to 3GPP2.
1 A Static-Node Assisted Adaptive Routing Protocol in Vehicular Networks Yong Ding, Chen Wang, Li Xiao {dingyong, wangchen, Department.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science R3: Robust Replication Routing in Wireless Networks with Diverse Connectivity Characteristics.
1 Hyades Command Routing Message flow and data translation.
A Trajectory-Preserving Synchronization Method for Collaborative Visualization Lewis W.F. Li* Frederick W.B. Li** Rynson W.H. Lau** City University of.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
Peer-to-peer and agent-based computing Peer-to-Peer Computing: Introduction.
Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
Auto-scaling Axis2 Web Services on Amazon EC2 By Afkham Azeez.
Computing Fundamentals Module Lesson 1 — Introducing Computers
Design of a reliable communication system for grid-style traffic light networks Junghoon Lee Dept. of Computer science and statistics Jeju National University.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Composite Device Computing Environment: A Framework for Situated Interaction Using Small Screen Devices Thai-Lai Pham, Georg Schneider, Stuart Goose and.
The Platform as a Service Model for Networking Eric Keller, Jennifer Rexford Princeton University INM/WREN 2010.
INTRODUCTION TO SIMULATION WITH OMNET++ José Daniel García Sánchez ARCOS Group – University Carlos III of Madrid.
Mobile Databases J. H. Wang May Outline Overview Issues in Mobile Databases –Data management –Transaction management Mobile Databases and Information.
Taming User-Generated Content in Mobile Networks via Drop Zones Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Mostafa Ammar, School of Computer Science Georgia Institute of Technology Atlanta, GA Mobile Computing in Cirrus Clouds: Mobile Computing in Cirrus Clouds:
CarTorrent ® : Cars get to have fun too Kevin C. Lee and Ian S. Yap TA: Uichin Lee Prof Mario Gerla.
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Making Time-stepped Applications Tick in the Cloud Tao Zou, Guozhang Wang, Marcos Vaz Salles*, David Bindel, Alan Demers, Johannes Gehrke, Walker White.
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
CSE 6007 Mobile Ad Hoc Wireless Networks
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science 1 MC 2 –Copying GC for Memory Constrained Environments Narendran Sachindran J. Eliot.
Dynamic Location Discovery in Ad-Hoc Networks
Energy Generation in Mitochondria and Chlorplasts
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
New Opportunities for Load Balancing in Network-Wide Intrusion Detection Systems Victor Heorhiadi, Michael K. Reiter, Vyas Sekar UNC Chapel Hill UNC Chapel.
Exploring Energy-Latency Tradeoffs for Broadcasts in Energy-Saving Sensor Networks AUTHOR: MATTHEW J. MILLER CIGDEM SENGUL INDRANIL GUPTA PRESENTER: WENYU.
SELF-ORGANIZING MEDIA ACCESS MECHANISM OF A WIRELESS SENSOR NETWORK AHM QUAMRUZZAMAN.
Decentralized Reactive Clustering in Sensor Networks Yingyue Xu April 26, 2015.
Sensor Network 教育部資通訊科技人才培育先導型計畫. 1.Introduction General Purpose  A wireless sensor network (WSN) is a wireless network using sensors to cooperatively.
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Adapting Asynchronous Messaging Middleware to Ad Hoc Networking Mirco Musolesi Cecilia Mascolo Stephen Hailes Dept. of Computer Science University College.
Location Resident Services Emmanouil Koukoumidis Princeton University Group Talk on 04/15/09 1.
Vehicle-to-Vehicle Wireless Communication Protocols for Enhancing Highway Traffic Safety - A Comparative Study of Data Dissemination Models for VANETs.
E-Road Project An Overview Pravin Shankar
Turning Ad Hoc Networks into Distributed Service Providers Cristian Borcea Department of Computer Science New Jersey Institute of Technology.
TrafficView: A Driver Assistant Device for Traffic Monitoring based on Car-to-Car Communication Sasan Dashtinezhad, Tamer Nadeem Department of CS, University.
ENHANCING AND EVALUATION OF AD-HOC ROUTING PROTOCOLS IN VANET.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
MOBILE CLOUD COMPUTING
The MobiSoC Middleware for Mobile Social Computing Cristian Borcea, Ankur Gupta, Achir Kalra, Quentin Jones, Liviu Iftode* Department of Computer Science.
Is your Car Talking with my Smart Phone? or Distributed Sensing and Computing in Mobile Networks Cristian Borcea Dept. of Computer Science, NJIT.
Research Projects in the Mobile Computing and Networking (MCN) Lab Guohong Cao Department of Computer Science and Engineering The Pennsylvania State University.
IGERT: Graduate Program in Computational Transportation Science Ouri Wolfson (Project Director) Peter Nelson, Aris Ouksel, Robert Sloan Piyushimita Thakuriah.
1 Mobile ad hoc networking with a view of 4G wireless: Imperatives and challenges Myungchul Kim Tel:
BitTorrent enabled Ad Hoc Group 1  Garvit Singh( )  Nitin Sharma( )  Aashna Goyal( )  Radhika Medury( )
Connectivity-Aware Routing (CAR) in Vehicular Ad Hoc Networks Valery Naumov & Thomas R. Gross ETH Zurich, Switzerland IEEE INFOCOM 2007.
Context-Aware Fault Tolerance in Migratory Services Oriana Riva +, Josiane Nzouonta *, and Cristian Borcea * + ETH Zurich * New Jersey Institute of Technology.
SR: A Cross-Layer Routing in Wireless Ad Hoc Sensor Networks Zhen Jiang Department of Computer Science West Chester University West Chester, PA 19335,
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
November 4, 2003Applied Research Laboratory, Washington University in St. Louis APOC 2003 Wuhan, China Cost Efficient Routing in Ad Hoc Mobile Wireless.
Overview of Wireless Networks: Cellular Mobile Ad hoc Sensor.
Overview Issues in Mobile Databases – Data management – Transaction management Mobile Databases and Information Retrieval.
IMPROVING OF WIRELESS MESH NETWORKS.
Overview of Wireless Networks:
Supporting Mobile Collaboration with Service-Oriented Mobile Units
VANET.
Presentation transcript:

Is Your Car Talking with My Smart Phone? or Distributed Sensing and Computing in Mobile Networks Cristian Borcea Department of Computer Science, NJIT

2 Wireless Computing/Sensing Systems >3.3B cell phones vs. 600M Internet-connected PCs in 2007 >3.3B cell phones vs. 600M Internet-connected PCs in 2007 >600M cell phones with Internet capability, rising rapidly >600M cell phones with Internet capability, rising rapidly New cars come equipped with GPS, navigation systems, and lots of sensors New cars come equipped with GPS, navigation systems, and lots of sensors Sensor deployment just starting, but some estimates ~5-10B units by 2015 Sensor deployment just starting, but some estimates ~5-10B units by 2015

Ubiquitous Computing Vision Computing, communication, and sensing anytime, anywhere Computing, communication, and sensing anytime, anywhere Wireless systems cooperate to achieve global tasks Wireless systems cooperate to achieve global tasks 3 How close are we from this vision? How close are we from this vision?

4 So Far … Not Very Close Nomadic computing Nomadic computing –Devices: laptops –Internet: intermittent connectivity –Work: typical desktop applications Mobile communication Mobile communication –Devices: PDAs, mobile phones, Blackberries –Internet: continuous connectivity –Work: and web Experimental sensor networks Experimental sensor networks –Devices: Berkeley/Crossbow motes –Internet: possible through base station –Work: monitor environment, wildlife

Why? Hard to program distributed applications over collections of wireless systems Hard to program distributed applications over collections of wireless systems –Systems Distributed across physical space Distributed across physical space Mobile Mobile Heterogeneous: both hardware and software Heterogeneous: both hardware and software Resource-constrained: battery, bandwidth, memory Resource-constrained: battery, bandwidth, memory –Networks Large scale Large scale Volatile: ad hoc topologies, dynamic resources Volatile: ad hoc topologies, dynamic resources Less secure than wired networks Less secure than wired networks 5

6 Our Research What programming models, system architectures, and protocols do we need when everything connects? What programming models, system architectures, and protocols do we need when everything connects?

7Outline Motivation Motivation MobiSoC: A middleware for mobile social computing MobiSoC: A middleware for mobile social computing Migratory Services: A context-aware service model for mobile ad hoc networks Migratory Services: A context-aware service model for mobile ad hoc networks RBVT: Road-based routing using real-time traffic information in vehicular networks RBVT: Road-based routing using real-time traffic information in vehicular networks Conclusions Conclusions New projects New projects –Mobius: A socially-aware peer-to-peer network infrastructure –Traffic safety using vehicular networks and sensor networks

8 Social Computing in the Internet Social networking applications improve social connectivity on-line Social networking applications improve social connectivity on-line –Stay in touch with friends –Make new friends –Find out information about events and places LinkedIn MyspaceFacebook

MHz processors MHz processors MB RAM MB RAM GSM, WiFi, Bluetooth GSM, WiFi, Bluetooth Camera, keyboard Camera, keyboard Symbian, Windows Mobile, Linux Symbian, Windows Mobile, Linux Java, C++, C# Java, C++, C# 9 Mobile Social Computing More than just social computing anytime, anywhere More than just social computing anytime, anywhere New applications will benefit from real-time location and place information New applications will benefit from real-time location and place information Smart phones are the ideal devices Smart phones are the ideal devices –Always with us –Internet-enabled –Locatable (GPS or other systems)

10 Mobile Social Computing Applications (MSCA) People-centric People-centric –Are any of my friends in the cafeteria now? –Is there anybody nearby with a common background who would like to play tennis? Place-centric Place-centric –How crowded is the cafeteria now? –Which are the places where CS students hang out? How to program MSCA? How to program MSCA? Challenges: capturing the dynamic relations between people and places, location systems, privacy, battery power Challenges: capturing the dynamic relations between people and places, location systems, privacy, battery power

11 MobiSoC Middleware Common platform for capturing, managing, and sharing the social state of a physical community Common platform for capturing, managing, and sharing the social state of a physical community Discovers emergent geo-social patterns and uses them to augment the social state Discovers emergent geo-social patterns and uses them to augment the social state

12 MobiSoC Architecture

Learning Emergent Geo-Social Patterns Example: GPI Algorithm GPI identifies previously unknown social groups and their associated places GPI identifies previously unknown social groups and their associated places –Fits into the people-place affinity learning module Clusters user mobility traces across time and space Clusters user mobility traces across time and space Its results can Its results can –Enhance user profiles and social networks using newly discovered group memberships –Enhance place semantics using group meeting times and profiles of group members 13

14 Location System Hardware-based location systems not feasible Hardware-based location systems not feasible –GPS doesnt work indoors –Deploying RF-receivers to measure the signals of mobiles is expensive and not practical for large places The user has no control over her location data! The user has no control over her location data! Software-based location systems that run on mobile devices preferable Software-based location systems that run on mobile devices preferable –Use signal strength and known location of WiFi access points or cellular towers –Allow users to decide when to share their location

15 Mobile Distributed System Architecture MSCA split between thin clients running on mobiles and services running on servers MSCA split between thin clients running on mobiles and services running on servers MSCA clients communicate synchronously with the services and receive asynchronous events from MobiSoC MSCA clients communicate synchronously with the services and receive asynchronous events from MobiSoC Advantages Advantages Faster execution Faster execution Energy efficiency Energy efficiency Improved trust Improved trust

16 Clarissa: Location-enhanced Mobile Social Matching Match Alert MatchType=Hangout Time: 1-3PM Co-Location: required MatchType=Hangout Time: 2-4PM Co-Location: required Match Alert

17 Tranzact: Place-based Ad Hoc Social Collaboration Whats on the menu? Cafeteria Chicken teriyaki Hungry

18 MobiSoC Implementation Runs on trusted servers Runs on trusted servers –Beta release: Service oriented architecture over Apache Tomcat Service oriented architecture over Apache Tomcat –Core services written in JAVA –API is exposed to MSCA services using KSOAP KSOAP is J2ME compatible and can be used to communicate with clients KSOAP is J2ME compatible and can be used to communicate with clients Client applications developed using J2ME on WiFi-enabled Windows-based smart phones Client applications developed using J2ME on WiFi-enabled Windows-based smart phones –Clarissa: Location engine: modified version of Intels Placelab Location engine: modified version of Intels Placelab –Accuracy meters

19Outline Motivation Motivation MobiSoC: A middleware for mobile social computing MobiSoC: A middleware for mobile social computing Migratory Services: A context-aware service model for mobile ad hoc networks Migratory Services: A context-aware service model for mobile ad hoc networks RBVT: Road-based routing using real-time traffic information in vehicular networks RBVT: Road-based routing using real-time traffic information in vehicular networks Conclusions Conclusions New projects New projects –Mobius: A socially-aware peer-to-peer network infrastructure –Traffic safety using vehicular networks and sensor networks

20 Ad Hoc Networks as Data Carriers Traditionally, ad hoc networks used to Traditionally, ad hoc networks used to –Connect mobile systems (e.g., laptop, PDA) to the Internet –Transfer files between mobile systems Internet Internet Read , browse the web File transfers

21 Ad Hoc Networks as People-Centric Mobile Sensor Networks Typical devices: smart phones and vehicular systems Typical devices: smart phones and vehicular systems Run distributed services Run distributed services –Acquire, process, disseminate real-time information from proximity of regions, entities, or activities of interest –Have context-aware execution –Often interact for longer periods of time with clients Entitytracking Parking spot finder Traffic jam predictor

22 Problems with Traditional Client-Server Model in Ad Hoc Networks When service stops satisfying context requirements, client must discover new service When service stops satisfying context requirements, client must discover new service –Overhead due to service discovery –State of the old service is lost –Not always possible to find new service

23 Virtual service end-point Migratory Services Model Client n1n1n1n1 C n2 n2n2 n2 n3 n3 n3 n3 Context Change! (e.g., n 2 moves out of the region of interest) MS cannot accomplish its task on n 2 any longer ServiceMigration MS State Migratory Service Service MS State Migratory Service Service

24 One-to-One Mapping between Clients and Migratory Services n1n1n1n1 C1 Meta-service n3n3n3n3 MCreate Migratory Service MS1 State n2n2n2n2 n5 n5 n5 n5 MS2 State C2 MS2 State n4 n4 n4 n4 MS1 State

25 Migratory Services Framework

26 TJam: Migratory Service Example TJam: Migratory Service Example Predicts traffic jams in real-time Predicts traffic jams in real-time –The request specifies region of interest –Service migrates to ensure it stays in this region –Uses history (service execution state) to improve prediction TJam utilizes information that every car has: TJam utilizes information that every car has: –Number of one-hop neighboring cars –Speed of one-hop neighboring cars Inform me when there is high probability of traffic jam 10 miles ahead

Implementation Implemented in Java Implemented in Java –Java 2 Micro-Edition (J2ME) with CLDC 1.1 and MIDP 2.0 –J2ME with CDC Development using HP iPAQs (running Linux), Nokia phones (running Symbian) Development using HP iPAQs (running Linux), Nokia phones (running Symbian) SM platforms SM platforms –Original SM on modified KVM (HP iPAQs) – migration state captured in the VM –Portable SM on Java VM, J2ME CDC (Nokia 9500) – migration state captured using bytecode instrumentation

28Outline Motivation Motivation MobiSoC: A middleware for mobile social computing MobiSoC: A middleware for mobile social computing Migratory Services: A context-aware service model for mobile ad hoc networks Migratory Services: A context-aware service model for mobile ad hoc networks RBVT: Road-based routing using real-time traffic information in vehicular networks RBVT: Road-based routing using real-time traffic information in vehicular networks Conclusions Conclusions New projects New projects –Mobius: A socially-aware peer-to-peer network infrastructure –Traffic safety using vehicular networks and sensor networks

29 Vehicular Ad Hoc Networks (VANET) Safer driving Safer driving –Quick dissemination of traffic alerts More fluid traffic More fluid traffic –Real-time dissemination of traffic conditions, traffic queries, dynamic route planning In-vehicle computing & entertainment In-vehicle computing & entertainment –P2P file sharing, gaming, location-aware advertisements Vehicle-to-vehicle short-range wireless communication

30 EZCab: Automatic Cab Booking Application Need a cab Use mobile ad hoc networks of cabs to book a free cab Use mobile ad hoc networks of cabs to book a free cab Used HP iPaqs, GPS, WiFi Used HP iPaqs, GPS, WiFi

31 TrafficView: Traffic Monitoring Application Provides dynamic, real-time view of the traffic ahead of you Provides dynamic, real-time view of the traffic ahead of you Initial prototype Initial prototype –Laptop/PDA running Linux –WiFi & Omni-directional antennas –GPS & Tiger/Line-based digital maps –Road identification software Second generation prototype (developed Second generation prototype (developed by Rutgers Univ) adds by Rutgers Univ) adds –Touch screen display –3G cards –Possibility to connect to the OBD system

32 Routing still a Big Problem for VANET Topological routing (e.g., AODV, DSR) suffers from frequent broken paths Topological routing (e.g., AODV, DSR) suffers from frequent broken paths S S N1N1 D N1N1 D a) At time t b) At time t+Δt N2N2 S D Dead end road N1N1 N2N2 Geographical routing (e.g., GPSR) frequently routes packets to dead-ends Geographical routing (e.g., GPSR) frequently routes packets to dead-ends

33 RBVT Routing Make decisions based on Make decisions based on –Road topology –Real-time data about vehicular connectivity on the roads More stable paths More stable paths –Consist of wirelessly-connected road intersections –Geographical forwarding used within road segments

Reactive and Proactive RBVT RBVT-R (reactive) RBVT-R (reactive) –Creates paths on-demand –Route discovery floods the network to find destination and records path –Route reply returns path to source RBVT-P (proactive) RBVT-P (proactive) –Connectivity packet unicasted periodically to discover the graph of wirelessly-connected road segments –When complete, connectivity packet flooded in the network to update the nodes with the new graph –Nodes compute shortest paths using this graph 34

Improved Geographical Forwarding 35 Remove overhead-prone periodic hello messages Remove overhead-prone periodic hello messages Used to learn the neighbors Used to learn the neighbors Replace them with distributed receiver-based next hop election Replace them with distributed receiver-based next hop election Self-election based on distance to destination, received power, and distance to sender Self-election based on distance to destination, received power, and distance to sender Messages piggybacked on RTS/CTS Messages piggybacked on RTS/CTS

36Evaluation NS-2 simulator with 250 cars moving at 20-60mph NS-2 simulator with 250 cars moving at 20-60mph –15 concurrent CBR flows Implemented a realistic vehicular traffic generator Implemented a realistic vehicular traffic generator Average delivery rate: RBVT-R is 71% better than AODV and 41% better than GSR Average delivery rate: RBVT-R is 71% better than AODV and 41% better than GSR Average end-to-end delay: RBVT-P is one order of magnitude better than AODV and GSR Average end-to-end delay: RBVT-P is one order of magnitude better than AODV and GSR

37 Conclusions and Lessons Learned Smart phones and vehicular systems create large scale real- life mobile networks Smart phones and vehicular systems create large scale real- life mobile networks Significant amount of system/networking research necessary to build applications over these networks Significant amount of system/networking research necessary to build applications over these networks Testing in real-life conditions is a must Testing in real-life conditions is a must –Ideally, at a decent scale as well Power is the most important resource of a mobile system Power is the most important resource of a mobile system Communication failures are the norm rather than the exception Communication failures are the norm rather than the exception Applications must be able to adapt to context and be robust to sensing errors Applications must be able to adapt to context and be robust to sensing errors

38Outline Motivation Motivation MobiSoC: A middleware for mobile social computing MobiSoC: A middleware for mobile social computing Migratory Services: A context-aware service model for mobile ad hoc networks Migratory Services: A context-aware service model for mobile ad hoc networks RBVT: Road-based routing using real-time traffic information in vehicular networks RBVT: Road-based routing using real-time traffic information in vehicular networks Conclusions Conclusions New projects New projects –Mobius: A socially-aware peer-to-peer network infrastructure –Traffic safety using vehicular networks and sensor networks

Mobius Network Infrastructure Decentralized two-tier infrastructure for mobile social computing Decentralized two-tier infrastructure for mobile social computing P2P tier P2P tier –Manages social state –Runs user-deployed services in support of mobile applications –Dynamically adapts to the geo- social context to enable energy-efficient, scalable, and reliable applications Mobile tier Mobile tier –Runs mobile applications and collects geo-social information using ad hoc communication 39 Application scenario: Community Multimedia Sharing System

Traffic Safety using VANET/Sensor Networks Symbiosis Add road-side sensors that communicate among themselves as well as with vehicles passing by Add road-side sensors that communicate among themselves as well as with vehicles passing by Improvement over VANET-only solutions Improvement over VANET-only solutions –Better detection of dangerous events –Better network connectivity –Persistent location-based storage Research Research –Communication protocols between vehicles and sensors –Programming API over this heterogeneous environment 40

41 Acknowledgments Work sponsored by NSF grants: Work sponsored by NSF grants: –CNS , CNS , IIS , IIS (mobile social computing) –CNS , CNS (vehicular networks) Students: Students: –Daniel Boston, Ankur Gupta, Achir Kalra, Josiane Nzouonta, Neeraj Rajgure Collaborators: Collaborators: –Grace Wang (CS), Quentin Jones (IS), Adriana Iamnitchi (Univ. of South Florida), Liviu Iftode (Rutgers), Oriana Riva (ETH Zurich)

42 Thank you!