DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.

Slides:



Advertisements
Similar presentations
Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
ROUTING IN INTERMITTENTLY CONNECTED MOBILE AD HOC NETWORKS AND DELAY TOLERANT NETWORKS: OVERVIEW AND CHALLENGES ZHENSHENG ZHANG.
LT Codes Paper by Michael Luby FOCS ‘02 Presented by Ashish Sabharwal Feb 26, 2003 CSE 590vg.
Digital Fountains: Applications and Related Issues Michael Mitzenmacher.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Performance analysis of LT codes with different degree distribution
Analysis and Construction of Functional Regenerating Codes with Uncoded Repair for Distributed Storage Systems Yuchong Hu, Patrick P. C. Lee, Kenneth.
Alex Dimakis based on collaborations with Dimitris Papailiopoulos Arash Saber Tehrani USC Network Coding for Distributed Storage.
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
Monday, June 01, 2015 ARRIVE: Algorithm for Robust Routing in Volatile Environments 1 NEST Retreat, Lake Tahoe, June
Computer Science 1 ShapeShifter: Scalable, Adaptive End-System Multicast John Byers, Jeffrey Considine, Nicholas Eskelinen, Stanislav Rost, Dmitriy Zavin.
Distributed Algorithms for Secure Multipath Routing
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
DNA Research Group 1 CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein.
Using Redundancy to Cope with Failures in a Delay Tolerant Network Sushant Jain, Michael Demmer, Rabin Patra, Kevin Fall Source:
Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University.
Threshold Phenomena and Fountain Codes
Erasure Correcting Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Sliding-Window Digital Fountain Codes for Streaming of Multimedia Contents Matta C.O. Bogino, Pasquale Cataldi, Marco Grangetto, Enrico Magli, Gabriella.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
RAPTOR CODES AMIN SHOKROLLAHI DF Digital Fountain Technical Report.
Collecting Correlated Information from a Sensor Network Micah Adler University of Massachusetts, Amherst.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
Computer Science Informed Content Delivery Across Adaptive Overlay Networks Overlay networks have emerged as a powerful and highly flexible method for.
Related Works of Data Persistence in WSN htchiu 1.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
Chih-Ming Chen, Student Member, IEEE, Ying-ping Chen, Member, IEEE, Tzu-Ching Shen, and John K. Zao, Senior Member, IEEE Evolutionary Computation (CEC),
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
GARUDA: Achieving Effective Reliability for Downstream Communication in Wireless Sensor Networks Seung-Jong Park et al IEEE Transactions on mobile computing.
Kai-Chao Yang VCLAB, NTHU 1.  Unequal Error Protection Rateless Codes for Scalable Information Delivery in Mobile Networks (INFOCOM 2007)  Rateless.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Andrew Liau, Shahram Yousefi, Senior Member, IEEE, and Il-Min Kim Senior Member, IEEE Binary Soliton-Like Rateless Coding for the Y-Network IEEE TRANSACTIONS.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
2007/03/26OPLAB, NTUIM1 A Proactive Tree Recovery Mechanism for Resilient Overlay Network Networking, IEEE/ACM Transactions on Volume 15, Issue 1, Feb.
15-853:Algorithms in the Real World
CountTorrent: Ubiquitous Access to Query Aggregates in Dynamic and Mobile Sensor Networks Abhinav Kamra, Vishal Misra and Dan Rubenstein - Columbia University.
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
FEC coding scheme in Multi-hop Wireless Networks Koh Choi Networked Media Laboratory Dept. of Information & Communications Gwangju Institute of.
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
Pei-Chuan Tsai Chih-Ming Chen Ying-ping Chen WCCI 2012 IEEE World Congress on Computational Intelligence Sparse Degrees Analysis for LT Codes Optimization.
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
A Mechanism for Communication- Efficient Broadcast Encryption over Wireless Ad Hoc Networks Johns Hopkins University Department of Computer Science Reza.
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Hongjie Zhu,Chao Zhang,Jianhua Lu Designing of Fountain Codes with Short Code-Length International Workshop on Signal Design and Its Applications in Communications,
1 Implementation and performance evaluation of LT and Raptor codes for multimedia applications Pasquale Cataldi, Miquel Pedros Shatarski, Marco Grangetto,
Advisor: Prof. Han-Chieh Chao Student: Joe Chen Date: 2011/06/07.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
An improved LT encoding scheme with extended chain lengths
Network Coding Network coding is useful
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Presentation transcript:

DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan Rubenstein

MSR Cambridge, 7/13/06 2 A generic sensor network Sink(s) Sensor Nodes Data follows multi-hop path to sink(s) data Sensed Data

MSR Cambridge, 7/13/06 3 An abstract channel Sensor Nodes Sinks Node on route to sink fails Communication dies Nodes fail Erasure Channel: Need Some Reliability Mechanism

MSR Cambridge, 7/13/06 4 Data Persistence We define data persistence of a sensor network to be the fraction of data generated within the network that eventually reaches the sink. Focus of Work: Maximizing Data Persistence

MSR Cambridge, 7/13/06 5 Specific Context  Sensor Networks in a Disaster setting  Monitoring earthquakes, fires, floods etc..  Network might get destroyed before delivering data  Disaster event might cause spikes in sensed data: congestion near sinks  Partial recovery of data also useful

MSR Cambridge, 7/13/06 6 Increasing persistence  Open Loop Approach (coding)  Apply channel codes to recover from errors  Closed Loop Approach (networking)  Employ feedback to retransmit lost data  Exploit topology awareness to route along surviving paths

MSR Cambridge, 7/13/06 7 Traditional approaches  Coding: erasure codes  Gallager Codes [1962], Rediscovered as LDPC  RS Codes [1960, Reed and Solomon]  Tornado Codes [1997, Luby et al.]  Luby Transform Codes [1998, Luby]  Come back to them later  Raptor Codes [2001, Shokrollahi]  Networking: reliable transport protocols for sensor networks  PSFQ [2002, Wan et al.]  RMST [2003, Stann et al.]  ESRT [2003, Akylidz et al.]

MSR Cambridge, 7/13/06 8 Why our problem is different (coding perspective)  Traditional approaches implement single source channel coding  Our data source is distributed  Traditional approaches aim at full recovery from errors (erasures)  In sensor networks partial recovery is useful and important

MSR Cambridge, 7/13/06 9 Why our problem is different (networking perspective)  In disaster scenarios need quick delivery of data  Feedback often infeasible  Often, no time to set up routing trees  Approach should employ minimal configuration  Difficult to predict which nodes will survive  Sinks might get destroyed. Location of sinks unkown  Surviving routes unknown  Feedback based approaches may not scale  Sensor nodes have limited resources to implement complex functionality

MSR Cambridge, 7/13/06 10 Our Approach  Two main ideas  Randomized routing and replication  Push data in random directions to ensure survival  Distributed channel codes that optimize data delivery (Growth Codes)  Based on LDPC erasure codes

MSR Cambridge, 7/13/06 11 Solution Features  Data replication (for persistence)  Explicit routing not required  Can employ if present  No feedback from sink necessary  Partial data recovery  Completely distributed

MSR Cambridge, 7/13/06 12 First Idea: Random Replication  Nodes transfer sensed data with random neighbors  Process iterates and sensed data is copied across the network  Sensed data goes on a “random walk” through the network  Process robust to localized failures  Can be thought of as a replication code Codes Naïve: Can we do better?

MSR Cambridge, 7/13/06 13 Brief Segway: Digital Fountain  Digital Fountain:  Source splits message into smaller data symbols  Data symbols are encoded into codewords  Potentially infinitely many unique codewords  Clients can decode original data with sufficiently many unique codewords  Low overhead erasure resistant channel codes

MSR Cambridge, 7/13/06 14 Luby Transform (LT) Codes  Rateless erasure codes  LT Codes are universal in the sense that they  Are near optimal for every erasure channel  Are very efficient as the data length grows.

MSR Cambridge, 7/13/06 15 Erasure Codes: LT-Codes b1b1 b2b2 b3b3 b4b4 b5b5 F= n=5 input blocks

MSR Cambridge, 7/13/06 16 LT-Codes: Encoding b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 1.Pick degree d 1 from a pre- specified distribution. (d 1 =2) 2.Select d 1 input blocks uniformly at random. (Pick b 1 and b 4 ) 3.Compute their sum (XOR). 4.Output sum, block IDs E(F)= F=

MSR Cambridge, 7/13/06 17 LT-Codes: Encoding E(F)= b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 F=

MSR Cambridge, 7/13/06 18 LT-Codes: Decoding b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c4c4 c5c5 c6c6 c7c7 b5b5 b5b5 b5b5 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c5c5 c6c6 c7c7 b5b5 c4c4 b5b5 b5b5 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c5c5 c6c6 c7c7 b5b5 c4c4 b5b5 b5b5 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c5c5 c6c6 c7c7 b5b5 c4c4 b5b5 b5b5 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c5c5 c6c6 c7c7 b5b5 c4c4 b5b5 b5b5 b2b2 b2b2 b1b1 b2b2 b3b3 b4b4 b5b5 c1c1 c2c2 c3c3 c5c5 c6c6 c7c7 b5b5 c4c4 b5b5 b5b5 b2b2 b2b2 Key to efficiency: the right degree distribution Receiver

MSR Cambridge, 7/13/06 19 Degree Distribution for LT-Codes  Soliton Distribution:  Avg degree H(N) ~ ln(N)  In expectation: Exactly one degree 1 symbol in each round of decoding  Distribution very fragile in practice, fixed with Robust Soliton  Soliton wave is one where dispersion balances refraction perfectly.  Soliton Distribution: input symbols are added to the ripple at the same rate as they are processed

MSR Cambridge, 7/13/06 20 Thought: Sensor Digital Fountain? Sensor Nodes Sinks Information survives losses

MSR Cambridge, 7/13/06 21 LT codes for sensor networks?  Sensed data could be the data units, but…  How do we achieve a given degree distribution?  LT codes designed for centralized sources  Sensor networks have distributed data sources  As a thought experiment, assume that magically we can implement distributed LT codes

MSR Cambridge, 7/13/06 22 Perfect Source Simulation: Sampling ideal distributions (N = 1500) Initially, no coding does Better than Robust Soliton! Robust Soliton improves as more codewords are received

MSR Cambridge, 7/13/06 23 Toy problem  Suppose a sink could ask for a codeword of the right degree, still chosen randomly, what would be the most useful?  A:Time dependent!

MSR Cambridge, 7/13/06 24 Coupon Collector’s Problem

MSR Cambridge, 7/13/06 25 Growth Codes  Degree of a codeword “grows” with time  At each timepoint codeword of a specific degree has the most utility for a decoder (on average)  This “most useful” degree grows monotonically with time  R: Number of decoded symbols sink has R1R1 R3R3 R2R2 R4R4 d=1 d=2d=3d=4 Time ->

MSR Cambridge, 7/13/06 26 Growth Codes: Encoding  R i is what the sink has received  What about encoding?  To decode R i, sink needs to receive some K i codewords, sampled uniformly  Sensor nodes estimate K i and transition accordingly  Optimal transition points a function of N, the size of the network  Exact value of K 1 computed. Upper bounds for K i, i > 1 computed.

MSR Cambridge, 7/13/06 27 Distributed Implementation of Growth Codes  Time divided into rounds  Each node exchanges degree 1 codewords with random neighbor until round K 1  Between round K i and K i-1 nodes exchange degree i codewords  Sink receives codewords as they get exchanged in the network  Growth Code degree distribution at time k  k) :=  i = max(0, min( (K i -K i-1 )/k, (k-K i-1 )/k))

MSR Cambridge, 7/13/06 28 Sensor Network Model  N node sensor network  Limited storage at each sensor node  Large storage at sink  All sensed data assumed independent  Do not consider source coding Sink x1x1 x9x9 x 10 x1x1 x2x2 x2x2 x3x3 x4x4 x6x6 x4x4

MSR Cambridge, 7/13/06 29 High Level View of the Protocol x1x1 x3x3 In the beginning: Nodes 1 and 3 exchanging codewords 3 x3x3 x3x3 x3x3 x3x3 x1x1 x1x1 x1x1 x1x1 Later on: Node 1 is destroyed: Symbol x 1 survives in the network. Nodes are now exchanging degree 2 codewords x4⊕x3x4⊕x3 x8x8 x8⊕x7x8⊕x7 x1⊕x4x1⊕x4 x2⊕x8x2⊕x8 x3x3 x6⊕x3x6⊕x3 x4⊕x5x4⊕x5 x2⊕x8x2⊕x8 x1⊕x4x1⊕x4

MSR Cambridge, 7/13/06 30 Received codewords Iterative Decoding x1x1 x3x3 x5x5 x2x2 x1x1 x3x3 x4x4 x3x3 Recovered symbols Unused codewords 5 original symbols x 1 … x 5 4 codewords received Each codeword is XOR of component original symbols

MSR Cambridge, 7/13/06 31 Online Decoding at the Sink x1x1 Recovered Symbols x6x6 x3x3 Undecoded codewords x2⊕x5x2⊕x5 Sink New codeword x2⊕x6x2⊕x6 x1x1 Recovered Symbols x6x6 x3x3 Undecoded codewords x2x2 = x6x6 ⊕ x2⊕x5x2⊕x5 x5x5 = x2x2 ⊕ x2⊕x6x2⊕x6 x5x5 Sink x2x2

MSR Cambridge, 7/13/06 32 Revisiting earlier simulation (N = 1500)

MSR Cambridge, 7/13/06 33 Time to recover all data Phase transition in obtaining last few data units (coupon collector’s problem)

MSR Cambridge, 7/13/06 34 Recovery Rate Without coding, a lot of data is lost during the disaster even when using randomized replication

MSR Cambridge, 7/13/06 35 Effect of Topology 500 nodes placed at random in a 1x1 square, nodes connected if within a distance of 0.3

MSR Cambridge, 7/13/06 36 Resilience to Random Failures 500 node random topology network Nodes fail every second with a probability of (1 every 4 seconds in the beginning)

MSR Cambridge, 7/13/06 37 Experiments with Motes  Crossbow micaz  2.4GHz IEEE   250 Kbps  High Data Rate Radio

MSR Cambridge, 7/13/06 38 Motes experiment

MSR Cambridge, 7/13/06 39 Motes experiment: continued

MSR Cambridge, 7/13/06 40 Conclusions  Developed distributed channel codes to maximize data persistence in (sensor) networks  First (to our knowledge) time varying LDPC codes  Proved Optimality of Growth Codes  Protocol requires minimal configuration (only rough estimate of network size needed)  Tested system with simulations and implementation on mica motes  More information: (tech report available, paper appearing in Sigcomm 2006)