Related Works of Data Persistence in WSN htchiu 1.

Slides:



Advertisements
Similar presentations
Contaminated Areas Monitoring via Distributed Rateless Coding with Constrained Data Gathering Cedomir Stefanovic, Vladimir Crnojevic, Dejan Vukobratovic,
Advertisements

Jesper H. Sørensen, Toshiaki Koike-Akino, and Philip Orlik 2012 IEEE International Symposium on Information Theory Proceedings Rateless Feedback Codes.
A Presentation by: Noman Shahreyar
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
D.J.C MacKay IEE Proceedings Communications, Vol. 152, No. 6, December 2005.
Network coding techniques Elena Fasolo Network coding techniques Elena Fasolo PhD Student - SIGNET Group Wireless Systems - Lecture.
LT-AF Codes: LT Codes with Alternating Feedback Ali Talari and Nazanin Rahnavard Oklahoma State University IEEE ISIT (International Symposium on Information.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
Data Persistence in Sensor Networks: Towards Optimal Encoding for Data Recovery in Partial Network Failures Abhinav Kamra, Jon Feldman, Vishal Misra and.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
1 Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti,
Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science,
Building Low-Diameter P2P Networks Eli Upfal Department of Computer Science Brown University Joint work with Gopal Pandurangan and Prabhakar Raghavan.
1 Distributed LT Codes Srinath Puducheri, Jörg Kliewer, and Thomas E. Fuja. Department of Electrical Engineering, University of Notre Dame, Notre Dame,
Online Data Gathering for Maximizing Network Lifetime in Sensor Networks IEEE transactions on Mobile Computing Weifa Liang, YuZhen Liu.
DNA Research Group 1 Growth Codes: Maximizing Sensor Network Data Persistence Vishal Misra Joint work with Abhinav Kamra, Jon Feldman (Google) and Dan.
1 Fountain Codes Based Distributed Storage Algorithms for Large-scale Wireless Sensor Networks Salah A. Aly, Zhenning Kong, Emina Soljanin IEEE IPSN 2008.
Digital Fountain with Tornado Codes and LT Codes K. C. Yang.
Anya Apavatjrut, Katia Jaffres-Runser, Claire Goursaud and Jean-Marie Gorce Combining LT codes and XOR network coding for reliable and energy efficient.
An Adaptive Probability Broadcast- based Data Preservation Protocol in Wireless Sensor Networks Liang, Jun-Bin ; Wang, Jianxin; Zhang, X.; Chen, Jianer.
Repairable Fountain Codes Megasthenis Asteris, Alexandros G. Dimakis IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 32, NO. 5, MAY /5/221.
Rateless Codes with Optimum Intermediate Performance Ali Talari and Nazanin Rahnavard Oklahoma State University, USA IEEE GLOBECOM 2009 & IEEE TRANSACTIONS.
M-GEAR: Gateway-Based Energy-Aware Multi-Hop Routing Protocol
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Rateless Coding with Feedback Andrew Hagedorn, Sachin Agarwal, David Starobinski, and Ari Trachtenberg Department of ECE, Boston University, MA, USA IEEE.
Optimal Degree Distribution for LT Codes with Small Message Length Esa Hyytiä, Tuomas Tirronen, Jorma Virtamo IEEE INFOCOM mini-symposium
2015/10/1 A color-theory-based energy efficient routing algorithm for mobile wireless sensor networks Tai-Jung Chang, Kuochen Wang, Yi-Ling Hsieh Department.
K. Banerjee, P. Basuchaudhuri, D. Sadhukhan and N. Das
A Distributed Framework for Correlated Data Gathering in Sensor Networks Kevin Yuen, Ben Liang, Baochun Li IEEE Transactions on Vehicular Technology 2008.
A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks Author: Xiaojiang Du, Guizani M., Yang Xiao.
Function Computation over Heterogeneous Wireless Sensor Networks Xuanyu Cao, Xinbing Wang, Songwu Lu Department of Electronic Engineering Shanghai Jiao.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
An Optimal Partial Decoding Algorithm for Rateless Codes Valerio Bioglio, Rossano Gaeta, Marco Grangetto, and Matteo Sereno Dipartimento di Informatica.
X1X1 X2X2 Encoding : Bits are transmitting over 2 different independent channels.  Rn bits Correlation channel  (1-R)n bits Wireless channel Code Design:
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Growth Codes: Maximizing Sensor Network Data Persistence abhinav Kamra, Vishal Misra, Jon Feldman, Dan Rubenstein Columbia University, Google Inc. (SIGSOMM’06)
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Stochastic Networks Conference, June 19-24, Connections between network coding and stochastic network theory Bruce Hajek Abstract: Randomly generated.
Converge-Cast: On the Capacity and Delay Tradeoffs Xinbing Wang Luoyi Fu Xiaohua Tian Qiuyu Peng Xiaoying Gan Hui Yu Jing Liu Department of Electronic.
LT Network Codes Mary-Luc Champel, Kevin Huguenin, Anne-Marie Kermarrec and Nicolas Le Scouarnec Technicolor, Rennes, France IEEE ICDCS (International.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Bounded relay hop mobile data gathering in wireless sensor networks
On the Topology of Wireless Sensor Networks Sen Yang, Xinbing Wang, Luoyi Fu Department of Electronic Engineering, Shanghai Jiao Tong University, China.
ON THE INTERMEDIATE SYMBOL RECOVERY RATE OF RATELESS CODES Ali Talari, and Nazanin Rahnavard IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 60, NO. 5, MAY 2012.
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
Multi-Edge Framework for Unequal Error Protecting LT Codes H. V. Beltr˜ao Neto, W. Henkel, V. C. da Rocha Jr. Jacobs University Bremen, Germany IEEE ITW(Information.
Computer Science Division
Network Coding Data Collecting Mechanism based on Prioritized Degree Distribution in Wireless Sensor Network Wei Zhang, Xianghua Xu, Qinchao Zhang, Jian.
1 G-REMiT: An Algorithm for Building Energy Efficient Multicast Trees in Wireless Ad Hoc Networks Bin Wang and Sandeep K. S. Gupta Computer Science and.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,
Nour KADI, Khaldoun Al AGHA 21 st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications 1.
Reliable Multi-hop Firmware Upload Protocol for mica2 motes. CSE 534 Advanced Networks Dmitri Lusnikov Fall 2004.
Ching-Ju Lin Institute of Networking and Multimedia NTU
Localized Low-Power Topology Control Algorithms in IEEE based Sensor Networks Jian Ma *, Min Gao *, Qian Zhang +, L. M. Ni *, and Wenwu Zhu +
OPTIMIZATION of GENERALIZED LT CODES for PROGRESSIVE IMAGE TRANSFER Suayb S. Arslan, Pamela C. Cosman and Laurence B. Milstein Department of Electrical.
Saran Jenjaturong, Chalermek Intanagonwiwat Department of Computer Engineering Chulalongkorn University Bangkok, Thailand IEEE CROWNCOM 2008 acceptance.
Efficient Geographic Routing in Multihop Wireless Networks Seungjoon Lee*, Bobby Bhattacharjee*, and Suman Banerjee** *Department of Computer Science University.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Coding for Multipath TCP: Opportunities and Challenges Øyvind Ytrehus University of Bergen and Simula Res. Lab. NNUW-2, August 29, 2014.
Protocols for Wireless Sensor Networks
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Network coding techniques
The Capacity of Wireless Networks
Presented by Jason L.Y. Lin
CRBcast: A Collaborative Rateless Scheme for Reliable and Energy-Efficient Broadcasting in Wireless Sensor/Actuator Networks Nazanin Rahnavard, Badri N.
Information Sciences and Systems Lab
Presentation transcript:

Related Works of Data Persistence in WSN htchiu 1

Outline Fountain codes – LT codes Wireless sensor network – Random geometric graph model Related works – Growth codes, ACM Sigcomm 2006 – EDFC, INFOCOM 2007 – LTCDS-I, IPSN 2008 – Ratless packet approach, IEEE Journal on Selected Areas in Communications 2010 summary 2

Fountain codes D.J.C MacKay IEE Proc.-Commun., Vol. 152, No. 6, December

Concept 4

Application One-to-many data delivery problem – Multicast – Broadcast P2P Robust distributed storage 5

LT Codes Michael Luby Proceedings of the 43 rd Annual IEEE Symposium on Foundations of Computer Science (FOCS’02 ) 6

Introduction 7

LT codes: Encoding Degree d = 2 value = 0 XOR 0 1.Choose d from a good degree distribution. 2.Choose d neighbors uniformly at random. 3.XOR

LT codes: Decoding Message Passing (Back substitution) Gaussian Elimination 9

Balls-and-Bins 10

All-At-Once distribution 11

All-At-Once distribution 12

Ideal Soliton Distribution 13 fragile

Robust Soliton Distribution  (d) = (  (d) +  (d)) /  where 14

Wireless Sensor Network 15

WSN To monitor physical and environmental conditions. – temperature, pressure, war zone, earthquake The sensors are energy constrained, unreliable, and computation limited. Collect data from sensors using – Push model (sink) – Pull model (mobile collector) 16

Data persistence in WSN The sensors are prone to fail due to running down of battery or external factors. How to increase data persistence in sensor networks? – Encoding data in distributed fashion 17

Data persistence in WSN Method – Simple replication – Erasure codes such as RS code, LT codes – Growth codes 18

Network Model 19

Random Geometric Graph [1] 20

Connectivity of RGG [2] 21

Related Works 22

Growth Codes: Maximizing Sensor Network Data Persistence Abhinav Kamra, Vishal Misra, Dan Rubenstein Department of Computer Science, Columbia University 23 Jon Feldman Google Labs ACM Sigcomm 2006

Growth codes 24 Degree of a codeword “grows” with time At each timepoint codeword of a specific degree has the most utility for a decoder (on average) This “most useful” degree grows monotonically with time R: Number of decoded symbols sink has R1R1 R3R3 R2R2 R4R4 d=1 d=2d=3d=4 Time ->

Growth codes The neighbor nodes of the sink have communication overloaded problem. 25

Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li Department of Electrical and Computer Engineering, University of Toronto 26 INFOCOM 2007

Introduction The first paper study on distributed implementation of fountain codes through stateless random walk. No sink is available.(but mobile collector.) 27

Random Walk A random walk with length L will stops at a node. If the length L of random walk is sufficiently long, then the distribution will achieve steady state. 28

IDEA 29

Probabilistic Forwarding Table computed by Metropolis algorithm based on the required steady-state distribution of the random walks, which in turn is derived from the initially assigned RSD. 30

Algorithm Step 1 : Degree generation – Choose degree independently from RSD. Step 2 : Compute steady-state distribution Step 3 : Compute probabilistic forwarding table – By the Metropolis algorithm Step 4 : Compute the number of random walk – b Step 5 : Block dissemination – Each node disseminate b copies of its source block with its node ID by b random walks based on the probabilistic forwarding table. Step 6: Encoding 31

Transmission Cost 32

Transmission cost KNb

Experiments Random Geometric Graph K = 10000, N =20000, r = The average number of neighbors for each node is 21. Decoding ration = 1.05 EDFC achieves the same decoding performance of the original centralized fountain codes. 34

Disadvantage 35

Fountain Codes Based Distributed Storage Algorithms for Large-Scale Wireless Sensor Networks Salah A.Aly, Zhenning Kong, Emina Soljanin 2008 International Conference on Information Processing in Sensor Networks 36

Introduction Simple random walk without trapping – Choose one of neighbors to send a packet. – To avoid local-cluster effect, let each node accept a packet equiprobably. – Visit each node in the network at least once. Little global information – N, K – LTCDS-II does not need any information in expense of transmission cost. 37

Cover Time 38

Algorithm 39

K = 40 40

Transmission Cost 41

42

η = 1.8 η = 1.6 Ideal Soliton Distribution 43

disadvantage Large transmission cost High decoding ratio Only evaluate the performance of small and medium number of k. 44

Rateless Packet Approach for Data Gathering in Wireless Sensor Networks Dejan Vukobratovic, Cedomir Stefanovic, Vladimir Crnojevic, Francesco Chiti, and Romano Fantacci 45 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 7, SEPTEMBER 2010.

Introduction Node-centric Packet-centric 46

Random walk 47

Mixing time 48

Performance 49

Performance 50

Transmission cost 51

Summary 52

Challenge How to disseminate data efficiently and scalably is a challenge in large-scale wireless sensor network, since the randomness of the network topology. How to find a practical dissemination method to guarantee Robust Soliton distribution subject to a resource constrained sensor network? 53

Reference [1] [2] Vivek Mhatre, Catherine Rosenberg, Design guidelines for wireless sensor networks: communication, clustering and aggregation, Ad Hoc Networks, Volume 2, Issue 1, January 2004, Pages 45-63, ISSN , /S (03) [3] A. Sinclair, and M. Jerrum, “Approximate counting, uniform generation and rapidly mixing Markov chains,” Information and Computation, vol. 82, pp. 93–133, [4] S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, “Mixing Times for Random Walk on Geometric Random Graphs,” Proc. SIAM ANALCO Workshop, 2005 [5] P. Gupta and P. R. Kumar, “The Capacity of Wireless Networks,” IEEE Trans. Info. Theory, vol. 46, No. 2, pp. 388–404, March [6] C. Avin and G. Ercal, “On the cover time and mixing time of random geometric graphs,” Theor. Comp. Science, vol. 380, pp. 2–22, [7]Improving the performance of LT codes on noisy channel with systematic connections and power allocations. 54