1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.

Slides:



Advertisements
Similar presentations
Scalable Content-Addressable Network Lintao Liu
Advertisements

D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
On Large-Scale Peer-to-Peer Streaming Systems with Network Coding Chen Feng, Baochun Li Dept. of Electrical and Computer Engineering University of Toronto.
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
1 Balancing Push and Pull for Efficient Information Discovery in Large-Scale Sensor Networks Xin Liu, Qingfeng Huang, Ying Zhang CS 6204 Adv Top. in Systems-Mob.
Modeling and Analysis of Random Walk Search Algorithms in P2P Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE, Rensselaer Polytechnic Institute.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Compressive Oversampling for Robust Data Transmission in Sensor Networks Infocom 2010.
HMM-BASED PATTERN DETECTION. Outline  Markov Process  Hidden Markov Models Elements Basic Problems Evaluation Optimization Training Implementation 2-D.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
Localized Techniques for Power Minimization and Information Gathering in Sensor Networks EE249 Final Presentation David Tong Nguyen Abhijit Davare Mentor:
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Robust Communications for Sensor Networks in Hostile Environments Ossama Younis and Sonia Fahmy Department of Computer Sciences, Purdue University Paolo.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Vassilios V. Dimakopoulos and Evaggelia Pitoura Distributed Data Management Lab Dept. of Computer Science, Univ. of Ioannina, Greece
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Extending Network Lifetime for Precision-Constrained Data Aggregation in Wireless Sensor Networks Xueyan Tang School of Computer Engineering Nanyang Technological.
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
Adaptive Self-Configuring Sensor Network Topologies ns-2 simulation & performance analysis Zhenghua Fu Ben Greenstein Petros Zerfos.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
Probability Grid: A Location Estimation Scheme for Wireless Sensor Networks Presented by cychen Date : 3/7 In Secon (Sensor and Ad Hoc Communications and.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
1 Fountain Codes Based Distributed Storage Algorithms for Large-scale Wireless Sensor Networks Salah A. Aly, Zhenning Kong, Emina Soljanin IEEE IPSN 2008.
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
Distributed Quality-of-Service Routing of Best Constrained Shortest Paths. Abdelhamid MELLOUK, Said HOCEINI, Farid BAGUENINE, Mustapha CHEURFA Computers.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
QoS-Aware In-Network Processing for Mission-Critical Wireless Cyber-Physical Systems Qiao Xiang Advisor: Hongwei Zhang Department of Computer Science Wayne.
Network Aware Resource Allocation in Distributed Clouds.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
Wei Gao1 and Qinghua Li2 1The University of Tennessee, Knoxville
Related Works of Data Persistence in WSN htchiu 1.
Prediction Assisted Single-copy Routing in Underwater Delay Tolerant Networks Zheng Guo, Bing Wang and Jun-Hong Cui Computer Science & Engineering Department,
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
Network Survivability Against Region Failure Signal Processing, Communications and Computing (ICSPCC), 2011 IEEE International Conference on Ran Li, Xiaoliang.
Lan F.Akyildiz,Weilian Su, Erdal Cayirci,and Yogesh sankarasubramaniam IEEE Communications Magazine 2002 Speaker:earl A Survey on Sensor Networks.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Cooperative Recovery of Distributed Storage Systems from Multiple Losses with Network Coding Yuchong Hu, Yinlong Xu, Xiaozhao Wang, Cheng Zhan and Pei.
An Energy Efficient Hierarchical Clustering Algorithm for Wireless Sensor Networks Seema Bandyopadhyay and Edward J. Coyle Presented by Yu Wang.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
A Passive Approach to Sensor Network Localization Rahul Biswas and Sebastian Thrun International Conference on Intelligent Robots and Systems 2004 Presented.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Dr. Sudharman K. Jayaweera and Amila Kariyapperuma ECE Department University of New Mexico Ankur Sharma Department of ECE Indian Institute of Technology,
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Cooperative Location- Sensing for Wireless Networks Authors : Haris Fretzagias Maria Papadopouli Presented by cychen IEEE International Conference on Pervasive.
An Energy-Efficient Geographic Routing with Location Errors in Wireless Sensor Networks Julien Champ and Clement Saad I-SPAN 2008, Sydney (The international.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
TreeCast: A Stateless Addressing and Routing Architecture for Sensor Networks Santashil PalChaudhuri, Shu Du, Ami K. Saha, and David B. Johnson Department.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Seminar On Rain Technology
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Pouya Ostovari and Jie Wu Computer & Information Sciences
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
Presentation transcript:

1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007

2 Outline Introduction Preliminaries Persistent Data Access  Two-way random walks  EDFC and ADFC Discussion of Multiple Encoded Blocks Performance Evaluation Conclusion

3 Introduction (1/5) It has been a conventional assumption that measured data in individual sensors are gathered and processed at powered sinks.  Internet Connections  via Data Aggregation This assumption may not realistically hold.  large-scale sensor networks  inaccessible geographical regions

4 Introduction (2/5) Our proposed vision is:  Ask the sensors to collaboratively store measured data over a historical period of time.  After a later time of convenience, a collector collects such measured data directly from the sensors. PUSH Model PULL Model Sensors send data periodically. Sensors are passively polled by the collector.

5 Introduction (3/5) We propose a novel decentralized implementation of fountain codes in sensor networks.  Data can be encoded in a distributed fashion. A sensor disseminates its data to a random subset of sensors in the network. Each sensor only encodes data it has received. The collector is able to decode original data by collecting a sufficient number of encoded data blocks.

6 Introduction (4/5) Our decentralized implementation of fountain codes does not require the support of a generic layer of routing protocols.  Do not need Routing Table or Geographical Routing Protocols.  Use random walks to disseminate data.

7 Introduction (5/5) : sensing nodes : caching nodes Sensed Data Caching Source Blocks Encoded Blocks failure! Caching Collector Decoding!

8 Preliminaries Why Fountain Codes? Replication  backup sensors  But a large number of replicas are required. Error-correcting Codes  Implemented in a centralized fashion Random Linear Codes  decentralized  But the decoding process is computationally expensive. Fountain Codes  Low decoding complexity:  superior decoding performance “Digital Fountain Codes V.S. Reed-Solomon Code For Streaming Applications” “Digital Fountain Codes V.S. Reed-Solomon Code For Streaming Applications” S. K. Chang

9 Preliminaries LT Codes In LT codes, K source blocks can be decoded from any subset of encoded blocks.  with probability degree  the number of source blocks used to generate an encoded block The degree distribution of encoded blocks in LT codes follows the Robust Soliton distribution.

10 Preliminaries LT Codes Ideal Soliton distribution Let Robust Soliton distribution

11 Preliminaries LT Codes Example of Robust Soliton distribution K=10000, c=0.2, and =0.05 The encoded blocks with a degree higher than K/R are not essential in decoding! K/R = 41 spike!

12 Preliminaries Random Walks on Graphs We describe random walks in the context of disseminating a source block.  sensor: node in the graph  The next hop is randomly chosen from the neighbors of the source node. A random walk corresponds to a time-reversible Markov chain. In this paper, we choose a variant of the Metropolis algorithm.  a generalization of the natural random walks for the Markov chain  non-uniform steady-state distribution

13 Preliminaries Metropolis Algorithm The Metropolis algorithm computes the transition matrix.  Steady-state distribution  : neighbors of node i  : maximal node degree in the graph

14 Persistent Data Access Decentralized Fountain Codes : sensing nodes K : caching nodes N Sensed Data Caching Source Blocks Encoded Blocks Caching degree d Sensed Data request source blocks based on two-way random walks request source blocks

15 Persistent Data Access Decentralized Fountain Codes We seek to construct decentralized fountain codes with only one traversal of random walks.  from sensing nodes to the caching nodes  Cache Nodes: Encode and store the source blocks.  Collector: Decode the source blocks. We propose two heuristic algorithms.  EDFC and ADFC  guarantee the Robust Soliton distribution of LT codes

16 Persistent Data Access Exact Decentralized Fountain Codes The randomization introduced by random walks.  Distinct source blocks received by a node is uncertain.  We must disseminate more than source blocks on each node. Redundancy Coefficient:  Assume each node receives blocks. , Pr (receive less than d nodes)

17 Persistent Data Access Exact Decentralized Fountain Codes The number of random walks: Probabilistic forwarding tables:

18 Persistent Data Access Exact Decentralized Fountain Codes : sensing nodes K : caching nodes N Sensed Data Caching Source Blocks Encoded Blocks Caching degree d Sensed Data source blocks, forwarding Table, and # of random walks. source blocks degree d Collector Decoding!

19 Persistent Data Access Exact Decentralized Fountain Codes The steps of EDFC are: Step 1. Degree generation. Step 2. Compute steady-state distribution. Step 3. Compute probabilistic forwarding table. Step 4. Compute the number of random walks. Step 5. Block dissemination. Step 6. Encoding. from the Robust Soliton distribution by the Metropolis algorithm b: number of random walks by bitwise XOR of a subset of d source blocks based on the probabilistic forwarding table The source node IDs are attached in the encoded block!

20 Persistent Data Access Exact Decentralized Fountain Codes Overhead ratio Violation Probability  Optimization Problem:  trade-off between coding performance and communication overhead

21 Persistent Data Access Exact Decentralized Fountain Codes Solve the optimization problem by MATLAB Parameter Setting  (constraints of violation probabilities) = 0.05  N (the number of total nodes) = 2000  K (the number of sensing nodes) = 1000  c = 0.01, = 0.05  Further numerical computation  overhead ratio =

22 Persistent Data Access Approximate Decentralized Fountain Codes Design a new distribution to be a hypothetical chosen degree distribution.  attempt to avoid its redundant random walks  Number of random walks  Steady-state distribution of the random walks

23 Persistent Data Access Approximate Decentralized Fountain Codes   Optimization Problem: minimize the mean-square error between and actual degree distribution of a node p

24 Persistent Data Access Approximate Decentralized Fountain Codes The steps of ADFC are: Step 1. Degree generation. Step 2. Compute steady-state distribution. Step 3. Compute probabilistic forwarding table. Step 4. Compute the number of random walks. Step 5. Block dissemination. Step 6. Encoding. from the chosen degree distribution by the Metropolis algorithm b: number of random walks based on the probabilistic forwarding table by bitwise XOR of all received source blocks The source node IDs are attached in the encoded block!

25 Persistent Data Access Approximate Decentralized Fountain Codes Overhead ratio of ADFC  b: the number of random walks in ADFC  b 0 : the number of random walks in the ideal algorithm By further numerical computation  The overhead ratio is only  Less transmission cost is required.  But…

26 Persistent Data Access Approximate Decentralized Fountain Codes Parameter Setting  N (number of total nodes) = 2000  K (number of sensing nodes) = 1000  c = 0.01, = 0.05 Robust Soliton distribution chosen degree distributionactual degree distribution inaccuracy!

27 Discussion of Multiple Encoded Blocks Does it improve the coding performance if different encoded blocks are maintained? Source Blocks …… Encoded Blocks Cache Node may lose some information… Sensing Nodes

28 Discussion of Multiple Encoded Blocks Theorem 2  When the code-degree distribution conforms to the Robust Soliton distribution, even if the source blocks on each node are not encoded, the collector must visit nodes in order to collect all source blocks with probability.  is a small positive number.  is a random variable that assumes the value 1 if the source block j is collected when visiting ith node. average degree of an encoded block [3]

29 Discussion of Multiple Encoded Blocks  has value 1 if source block j is collected after visiting M nodes.  E denote the event that all blocks are collected after visiting M nodes.  All blocks are collected with probability

30 Discussion of Multiple Encoded Blocks  Apply logarithm to both sides  By using similar approximation, we obtain The collector needs to visit nodes to collect all K source blocks.

31 Performance Evaluation We implement both the original centralized and the decentralized implementation of fountain codes.  To evaluate the effectiveness and performance Centralized implementation of fountain codes  about 1000 lines of C++ code  Optimized implementation of encoding and decoding algorithms. Decentralized implementation of fountain codes  also simulated in C++

32 Performance Evaluation Use two-dimensional Geometric Random Graph as the topological model.  N sensors are uniformly distributed on a unit disk  K sensing nodes are uniformly distributed among the N sensors.  Radio range: r We set K=10000, N=20000, and r=0.033 in most experiments. The average number of neighbors for each node is 21.

33 Performance Evaluation Communication Cost and Decoding Ratio Two main performance metrics  Communication Cost and Decoding Ratio Communication Cost  the length of random walks  the number of random walks Decoding Ratio  number of nodes need to be visited by a collector for decoding  Normalized by the number of sensing nodes. fault tolerance!

34 Performance Evaluation Communication Cost and Decoding Ratio The impact of the length of random walks on decoding ratio. Each Data Point: the average and the 95% confidence interval from 10 experiments

35 Performance Evaluation Communication Cost and Decoding Ratio The ratio of dissemination costs of EDFC and ADFC to that of the two-way algorithm

36 Performance Evaluation Multiple Encoded Blocks Cannot Do Better Theorem 2:  Keeping multiple encoded blocks on each node does not offer any asymptotic performance advantage over keeping a single encoded block. The collector needs to visit close to K nodes even if the source blocks are not encoded. The number of nodes to be visited before collecting all source blocks.

37 Performance Evaluation Overestimation of K and N The failure of sensors are common events.  in large-scale sensor networks It is not feasible to update K and N to all nodes in the network whenever they change.  Update K and N periodically.  Each node may overestimate K and N.

38 Performance Evaluation Overestimation of K and N The consequence of overestimating N:  N: the number of total nodes Actual N =

39 Performance Evaluation Overestimation of K and N The impact of overestimating K:  K: the number of sensing nodes Estimated K = EDFC is more robust!

40 Conclusion In this paper, we seek to improve the fault tolerance and data persistence in sensor networks.  decentralized implementation of fountain codes  disseminate original data throughout the network with random walks Superior decoding performance and low decoding complexity of fountain codes.  as the number of nodes scales up The proposed algorithms are able to provide near- optimal fault tolerance.  with minimal demand on local storage