HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008.

Slides:



Advertisements
Similar presentations
P2PR-tree: An R-tree-based Spatial Index for P2P Environments ANIRBAN MONDAL YI LIFU MASARU KITSUREGAWA University of Tokyo.
Advertisements

1 S4: Small State and Small Stretch Routing for Large Wireless Sensor Networks Yun Mao 2, Feng Wang 1, Lili Qiu 1, Simon S. Lam 1, Jonathan M. Smith 2.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Peer to Peer and Distributed Hash Tables
Peer-to-Peer Systems Chapter 25. What is Peer-to-Peer (P2P)? Napster? Gnutella? Most people think of P2P as music sharing.
1 Greedy Forwarding in Dynamic Scale-Free Networks Embedded in Hyperbolic Metric Spaces Dmitri Krioukov CAIDA/UCSD Joint work with F. Papadopoulos, M.
CHORD: A Peer-to-Peer Lookup Service CHORD: A Peer-to-Peer Lookup Service Ion StoicaRobert Morris David R. Karger M. Frans Kaashoek Hari Balakrishnan Presented.
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
Small-world Overlay P2P Network
Shivkumar Kalyanaraman Rensselaer Polytechnic Institute 1 ECSE-6600: Internet Protocols Informal Quiz #13: P2P and Sensor Networks Shivkumar Kalyanaraman:
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Peer to Peer File Sharing Huseyin Ozgur TAN. What is Peer-to-Peer?  Every node is designed to(but may not by user choice) provide some service that helps.
Cis e-commerce -- lecture #6: Content Distribution Networks and P2P (based on notes from Dr Peter McBurney © )
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Exploiting Content Localities for Efficient Search in P2P Systems Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang 1 1 College of William and Mary,
CS 672 Paper Presentation Presented By Saif Iqbal “CarNet: A Scalable Ad Hoc Wireless Network System” Robert Morris, John Jannotti, Frans Kaashoek, Jinyang.
Object Naming & Content based Object Search 2/3/2003.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
Topics in Reliable Distributed Systems Fall Dr. Idit Keidar.
1 CS 194: Distributed Systems Distributed Hash Tables Scott Shenker and Ion Stoica Computer Science Division Department of Electrical Engineering and Computer.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
CS 268: Overlay Networks: Distributed Hash Tables Kevin Lai May 1, 2001.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
Ad Hoc Wireless Routing COS 461: Computer Networks
The Structure of Networks with emphasis on information and social networks T-214-SINE Summer 2011 Chapter 8 Ýmir Vigfússon.
P2P File Sharing Systems
INTRODUCTION TO PEER TO PEER NETWORKS Z.M. Joseph CSE 6392 – DB Exploration Spring 2006 CSE, UT Arlington.
1 Napster & Gnutella An Overview. 2 About Napster Distributed application allowing users to search and exchange MP3 files. Written by Shawn Fanning in.
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
1 Computer Communication & Networks Lecture 22 Network Layer: Delivery, Forwarding, Routing (contd.)
GeoGrid: A scalable Location Service Network Authors: J.Zhang, G.Zhang, L.Liu Georgia Institute of Technology presented by Olga Weiss Com S 587x, Fall.
“Intra-Network Routing Scheme using Mobile Agents” by Ajay L. Thakur.
2: Application Layer1 Chapter 2 outline r 2.1 Principles of app layer protocols r 2.2 Web and HTTP r 2.3 FTP r 2.4 Electronic Mail r 2.5 DNS r 2.6 Socket.
Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications Xiaozhou Li COS 461: Computer Networks (precept 04/06/12) Princeton University.
Chapter 22 Network Layer: Delivery, Forwarding, and Routing Part 5 Multicasting protocol.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
SIGCOMM 2001 Lecture slides by Dr. Yingwu Zhu Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Efficient P2P Search by Exploiting Localities in Peer Community and Individual Peers A DISC’04 paper Lei Guo 1 Song Jiang 2 Li Xiao 3 and Xiaodong Zhang.
Intradomain Traffic Engineering By Behzad Akbari These slides are based in part upon slides of J. Rexford (Princeton university)
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
CS 268: Project Suggestions Ion Stoica January 26, 2004.
Peer to Peer Network Design Discovery and Routing algorithms
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
1 An Arc-Path Model for OSPF Weight Setting Problem Dr.Jeffery Kennington Anusha Madhavan.
Routing Algorithms and IP Addressing Routing Algorithms must be ▪ Correctness ▪ Simplicity ▪ Robustness ▪ Stability ▪ Fairness ▪ Optimality.
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Tapestry : An Infrastructure for Fault-tolerant Wide-area Location and Routing Presenter : Lee Youn Do Oct 5, 2005 Ben Y.Zhao, John Kubiatowicz, and Anthony.
Location Privacy Protection for Location-based Services CS587x Lecture Department of Computer Science Iowa State University.
LOOKING UP DATA IN P2P SYSTEMS Hari Balakrishnan M. Frans Kaashoek David Karger Robert Morris Ion Stoica MIT LCS.
CS Spring 2014 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
INTERNET TECHNOLOGIES Week 10 Peer to Peer Paradigm 1.
P2P Search COP6731 Advanced Database Systems. P2P Computing  Powerful personal computer Share computing resources P2P Computing  Advantages: Shared.
CS Spring 2012 CS 414 – Multimedia Systems Design Lecture 37 – Introduction to P2P (Part 1) Klara Nahrstedt.
1 Chapter 4: Internetworking (IP Routing) Dr. Rocky K. C. Chang 16 March 2004.
Distance Vector Routing
1 Traffic Engineering By Kavitha Ganapa. 2 Introduction Traffic engineering is concerned with the issue of performance evaluation and optimization of.
CS Spring 2010 CS 414 – Multimedia Systems Design Lecture 24 – Introduction to Peer-to-Peer (P2P) Systems Klara Nahrstedt (presented by Long Vu)
1 Computer Networks Chapter 5. Network layer The network layer is concerned with getting packets from the source all the way to the destination. Getting.
Intra-Domain Routing Jacob Strauss September 14, 2006.
Early Measurements of a Cluster-based Architecture for P2P Systems
EE 122: Peer-to-Peer (P2P) Networks
Routing in Packet Networks Shortest Path Routing
CS 162: P2P Networks Computer Science Division
EE 122: Lecture 13 (IP Multicast Routing)
Overview: Chapter 2 Localization and Tracking
Presentation transcript:

HERO: Online Real-time Vehicle Tracking in Shanghai Xuejia Lu 11/17/2008

SG Project Overview  ShanghaiGrid(SG) project aims to provide abundant intelligent transportation services navigation trip planning optimal route selection to avoid congestion bus arrival prediction …  Online real-time vehicle tracking is the most fundamental service active RFID tag is planted on the tire RFID readers and wireless APs are installed on crossroads local node collecting data local node connects to Internet

SG Project Challenges  Real-time requirement an query must be answered within a certain bounded time e.g. a stolen car  Scalable up to millions of users and hundreds of thousands of vehicles huge number of simultaneous queries  Robust to node failures thousands of local nodes system maintenance is not easy

Several Existing Solutions  Centralized scheme centralized database stores all vehicles ’ location information accepts all queries more than 22,000 crossroads in Shanghai, thousands of events/s  Distributed schemes captured vehicle information can be stored locally at distributed nodes BUT no hint about the enquired vehicle for a query

Several Existing Solutions (cont’d)  Distributed schemes Flooding: flood the query across the network large amount of traffic poor scalability fail to satisfy real-time requirement Random Walk: long query latency DHTs: map objects to peers Chord, Tapestry, Pastry etc. large computation and traffic overhead for large number of rapid updates of moving objects

Proposed Solution: HERO  HERO stands for : Hierarchical Exponential Region Organization  GOAL : limit the maximum query response time minimize network traffic  Core Idea: update location information in a controlled way

Four Components  Overlay construction  Hierarchy initialization  Restricted location updating  Query Routing

Overlay construction overlay network matches underlying road network connection between two geographically neighboring local nodes

Hierarchy initialization Each region has a radius (in hops) If,then Every node maintains a next-insider pointer that points to a node which is on the boundary of the immediate inner region First node that captures a new vehicle trigger initialization procedure: a packet contains router field and journey field, initializes to its IP address and one Other nodes will set its next-insider to router contained in the packet If journey value equals to the radius of certain : 1) modifies router field to its IP 2) marks itself the boundary node of

Restricted location updating Chaser: the local node that moving vehicle passes by Chaser perform location updating and maintains the hierarchy Three cases to consider depending on the chaser ’ s location The simplest case 1 : chaser is an interior node with R1 chaser floods the vehicle ’ s information to all other nodes within R1

Case 2: boundary node of R1 HERO needs to re-organize R1 node a initiates update packet: similar to initialization but with an additional scale field to indicate the propagate area, here it is R1 nodes in R2 will be update to have the current position of the new R1 special case: new R1 could be truncated by R2, to ensure container relationship

Case 3: common boundary node HERO needs to re-organize R1 the several regions need to be re-build, node b will be the new circle center nodes in R3 will be update to have the current position of the new R2 special case: new R2 could be truncated by R3, to ensure container relationship The maximum network traffic overhead of location updating for a vehicle moving a distance of D (network diameter) : (c is a constant coefficient)

Query Routing R1 will always have the latest location information of the vehicle. A query can be issued from any node, when a boundary node receive the query, unless it is on the R1, it will forward the query to the inner region ’ s boundary node. It takes at most hops for a query to be answered, where D is the network diameter.

Performance Evaluation small white dots: 1,000 nodes red dots: location captured, tax is vacant dark dots: tax is delivering one hour extensive trace data of 100 taxies, real GPS data, randomly generate 100,000 queries that hour Two Metrics:  Maximum query latency  Network traffic per query

Results latency drops when k and r increases:

Results(cont’d) traffic increases when k or r increases: extreme case: r=D or r=1, k=D

Assumptions and Limitations  Assumes all vehicles have active RFID tag planted in tires  Number of hierarchies could be up to the same as number of nodes  A node could have many next-insider pointers, query routing would be similar to that of Gnutella  How to solve query routing for the vehicle that is not exist, could lead to cycle  System cost could be high, because of planning one node (server) on every crossroad  Privacy concern of tracking personal vehicle all the time