Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006.

Slides:



Advertisements
Similar presentations
Directed Diffusion for Wireless Sensor Networking
Advertisements

Scalable Content-Addressable Network Lintao Liu
A Presentation by: Noman Shahreyar
1 Data-Centric Storage in Sensornets with GHT, A Geographic Hash Table Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin, Li.
Geo – Routing in ad hoc nets References: Brad Karp and H.T. Kung “GPSR: Greedy Perimeter Stateless Routing for Wireless Networks”, Mobicom 2000 M. Zorzi,
Rumor Routing Algorithm For sensor Networks David Braginsky, Computer Science Department, UCLA Presented By: Yaohua Zhu CS691 Spring 2003.
1 Routing Techniques in Wireless Sensor networks: A Survey.
The University of Iowa. Copyright© 2005 A. Kruger 1 Introduction to Wireless Sensor Networks WSN Routing II 21 March 2005.
Geographic Routing Without Location Information A. Rao, S. Ratnasamy, C. Papadimitriou, S. Shenker, I. Stoica Paper and Slides by Presented by Ryan Carr.
Small-world Overlay P2P Network
Data-Centric Storage in Sensor Networks With GHT Khaldoun A. Ibrahim,
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks.
Wireless Capacity. A lot of hype Self-organizing sensor networks reporting on everything everywhere Bluetooth personal networks connecting devices City.
1 Data Persistence in Large-scale Sensor Networks with Decentralized Fountain Codes Yunfeng Lin, Ben Liang, Baochun Li INFOCOM 2007.
Data Centric Storage using GHT Lecture 13 October 14, 2004 EENG 460a / CPSC 436 / ENAS 960 Networked Embedded Systems & Sensor Networks Andreas Savvides.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #4 Mobile Ad-Hoc Networks AODV Routing.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
1 Data-Centric Storage in Sensornets Sylvia Ratnasamy, Scott Shenker, Brad Karp, Ramesh Govindan, Deborah Estrin ICSI/UCB/USC/UCLA Presenter: Vijay Sundaram.
Placement of Continuous Media in Wireless Peer-to-Peer Network Shahramram Ghandeharizadeh, Bhaskar Krishnamachari, and Shanshan Song IEEE Transactions.
Dissemination protocols for large sensor networks Fan Ye, Haiyun Luo, Songwu Lu and Lixia Zhang Department of Computer Science UCLA Chien Kang Wu.
A Scalable Content-Addressable Network Authors: S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker University of California, Berkeley Presenter:
Directed Diffusion: A Scalable and Robust Communication Paradigm for Sensor Networks Intanagonwiwat, Govindan, Estrin USC, Information Sciences Institute,
Matching Data Dissemination Algorithms to Application Requirements John Heidermann, Fabio Silva, Deborah Estrin Presented by Cuong Le (CPSC538A)
Data-Centric Storage in Sensornets Submitted to Sigcomm 2002 Authors: Sylvia Ratnasamy et al. ICIR, UCLA, UC-Berkeley Presenter:Shang-Chieh Wu
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
A Cross Layer Approach for Power Heterogeneous Ad hoc Networks Vasudev Shah and Srikanth Krishnamurthy ICDCS 2005.
1 Load Balance and Efficient Hierarchical Data-Centric Storage in Sensor Networks Yao Zhao, List Lab, Northwestern Univ Yan Chen, List Lab, Northwestern.
Beacon Vector Routing: Scalable Point-to-Point Routing in Wireless Sensornets.
Range Queries in Distributed Networks Jie Gao Stony Brook University Dagstuhl Seminar, March 14 th,
Geographic Routing Without Location Information A. Rao, C. Papadimitriou, S. Shenker, and I. Stoica In Proceedings of the 9th Annual international Conference.
An adaptive framework of multiple schemes for event and query distribution in wireless sensor networks Vincent Tam, Keng-Teck Ma, and King-Shan Lui IEEE.
1 Chalermek Intanagonwiwat (USC/ISI) Ramesh Govindan (USC/ISI) Deborah Estrin (USC/ISI and UCLA) DARPA Sponsored SCADDS project Directed Diffusion
Load Balancing of In-Network Data-Centric Storage Schemes in Sensor Networks Mohamed Aly In collaboration with Kirk Pruhs and Panos K. Chrysanthis Advanced.
2008/2/191 Customizing a Geographical Routing Protocol for Wireless Sensor Networks Proceedings of the th International Conference on Information.
Ubiquitous Networks WSN Routing Protocols Lynn Choi Korea University.
Routing and Data Dissemination. Outline Motivation and Challenges Basic Idea of Three Routing and Data Dissemination schemes in Sensor Networks Some Thoughts.
Geographic Hash Table S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin and F. Yu.
Data centric Storage In Sensor networks Based on Balaji Jayaprakash’s slides.
Decomposing Data-Centric Storage Query Hot-Spots in Sensor Netwokrs Mohamed Aly, Panos K. Chrysanthis, and Kirk Pruhs University of Pittsburgh Proceeding.
Benjamin AraiUniversity of California, Riverside Reliable Hierarchical Data Storage in Sensor Networks Song Lin – Benjamin.
ENERGY-EFFICIENT FORWARDING STRATEGIES FOR GEOGRAPHIC ROUTING in LOSSY WIRELESS SENSOR NETWORKS Presented by Prasad D. Karnik.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
College of Engineering Grid-based Coordinated Routing in Wireless Sensor Networks Uttara Sawant Major Advisor : Dr. Robert Akl Department of Computer Science.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Zone Sharing: A Hot-Spots Decomposition Scheme for Data-Centric Storage in Sensor Networks Mohamed Aly Nicholas Morsillo Panos K. Chrysanthis Kirk Pruhs.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Problem Wensheng Zhang, Dr. Guohong Cao, and Dr. Tom La Porta Example: Battlefield Surveillance Challenges Small Sensing Range Limitations in sensor nodes.
Dual-Region Location Management for Mobile Ad Hoc Networks Yinan Li, Ing-ray Chen, Ding-chau Wang Presented by Youyou Cao.
Energy conservation in Wireless Sensor Networks Sagnik Bhattacharya, Tarek Abdelzaher University of Virginia, Department of Computer Science School of.
CarNet/Grid: Scalable Ad-Hoc Geographic Routing Robert Morris MIT / LCS
BARD / April BARD: Bayesian-Assisted Resource Discovery Fred Stann (USC/ISI) Joint Work With John Heidemann (USC/ISI) April 9, 2004.
1 A Context Discovery Middleware for Context-Aware Applications with Heterogeneous Sensors Yu-Min Tseng.
1 Distributed Hash Table CS780-3 Lecture Notes In courtesy of Heng Yin.
STDCS: A Spatio-Temporal Data-Centric Storage Scheme For Real-Time Sensornet Applications Mohamed Aly (University of Pittsburgh & Yahoo, Inc.) In collaboration.
1 Presented by Jing Sun Computer Science and Engineering Department University of Conneticut.
Energy Efficient Data Management for Wireless Sensor Networks with Data Sink Failure Hyunyoung Lee, Kyoungsook Lee, Lan Lin and Andreas Klappenecker †
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Large Scale Sharing Marco F. Duarte COMP 520: Distributed Systems September 19, 2004.
Location-Centric Storage for Wireless Sensor Networks Kai Xingn 1, Xiuzhen Cheng 1, and Jiang Li 2 1 Department of Computer Science, The George Washington.
Attribute Allocation in Large Scale Sensor Networks Ratnabali Biswas, Kaushik Chowdhury, and Dharma P. Agrawal International Workshop on Data Management.
15-829A/18-849B/95-811A/19-729A Internet-Scale Sensor Systems: Design and Policy Review.
Wireless Sensor Networks
Delay-Tolerant Networks (DTNs)
Introduction to Wireless Sensor Networks
Wireless Sensor Network Architectures
GPSR Greedy Perimeter Stateless Routing
Net 435: Wireless sensor network (WSN)
Overview: Chapter 3 Networking sensors
Presentation transcript:

Data Centric Storage: GHT Brad Karp UCL Computer Science CS 4C38 / Z25 17 th January, 2006

2 User remote; connected via base station How do users pose queries? –by event name (e.g., “Zebras?”) Query(“Zebra”) {(“Zebra”, i, [u, v]); (“Zebra”, j, [x, y])} –Geographic Hash Table (GHT) In-network storage of data Data placement, query routing built on geographic routing One View of Sensor Networks: Querying Zebra Sightings (x, y) (u, v) user j i

3 Problem: Data Dissemination in Sensornets Sensors numerous and widely dispersed Sensed data must reach remote user Data dissemination problem: –How best can we supply measured data to users? Design drivers for system: Energy scarce Wireless media prone to contention

4 Context: Directed Diffusion [Estrin et al., 2000] “Zebra?” (“Zebra”, i, [u,v]) (u, v) i (“Zebra”, j, [x,y]) j (x, y) Data-centric routing: flood queries (interests) by name Return any responses along reverse paths

5 Assumptions, Metrics, Terminology Large-scale networks with known geographic boundaries Users on WAN, a few APs with WAN uplinks Nodes know own geographic locations; often needed to annotate sensed data Energy metrics –Total usage: total number packet txs –Hotspot usage: max. number txs by one node Event: discrete, named object recognized by sensor (e.g., “Zebra”) Query: request from user for data under same naming scheme

6 Outline Motivation and Context Canonical Data Dissemination Approaches Geographic Hash Table (GHT) Service Evaluation in Simulation Summary

7 Canonical Approach: Local Storage For n nodes, Q event names queried for, and D q events detected with those names, cost (in pkts): –Total: –Hotspot: (at access point) “Zebra?” (“Zebra”, i, [u,v]) (u, v) i (“Zebra”, j, [x,y]) j (x, y)

8 Canonical Approach: External Storage (“Zebra”, i, [u,v]) (u, v) i (“Zebra”, j, [x,y]) j (x, y) (“Cat”, k, [s,t]) (s, t) For n nodes, D t total events detected, cost (in pkts): –Total: –Hotspot: (at access point)

9 Canonical Approach: Data-Centric Storage (DCS) For n nodes, Q names queried, D q of those events detected, cost (in pkts): Total (full enumeration): Total (summarization): Hotspot (full enumeration): (at access point) Hotspot (summarization): (at access point) user “Zebra?” j i (x, y) (u, v)

10 Cost Comparison of Canonical Approaches Local storage incurs greatest total message count as n grows External storage always sends fewer total messages than DCS When many more event types detected than queried for, DCS incurs least hotspot message count DCS permits summarization of events (return multiple events in one packet)

11 Outline Motivation and Context Canonical Data Dissemination Approaches Geographic Hash Table (GHT) Service Evaluation in Simulation Summary

12 Geographic Hash Table: A Sketch Two operations: –Put(k, v) stores event v under key k –Get(k) retrieves event associated with key k Hash key k into geo coordinates; store and retrieve events for that key at that location –Spreads key space storage load evenly across network! user H(“Zebra”) = (a, b) (a, b) “Zebra?” j i (x, y) (u, v)

13 Design Criteria for Scalable, Robust DCS Storage system must offer persistence despite node and link failures –If node holding k changes, queries and data must make consistent choice of new node Storage shouldn’t concentrate at any one node Storage capacity should increase with node count As ever, avoid traffic concentration, minimize message count

14 GHT: Home Nodes and Perimeters Likely no node exactly at H(k); hash function ignorant of topology Home node: closest node to point output by H(k) Home perimeter: perimeter enclosing point output by H(k)

15 Consistency: Perimeter Refresh Protocol (PRP) (k,v) pairs replicated at all nodes on home perimeter Non-home nodes on home perimeter: replica nodes Home node sends refresh packets every T h seconds, containing all (k,v), to H(k) Receiver of refresh who is closer to H(k) than originator consumes it, initiates its own Replica node becomes home node if its own refresh returns Upon forwarding a refresh, node resets takeover timer for T t seconds; upon expiration, node generates a refresh for k Death timer: all nodes expire (k,v) pairs they cache after T d seconds; reset every time refresh for k received.

16 Outline Motivation and Context Canonical Data Dissemination Approaches Geographic Hash Table (GHT) Service Evaluation in Simulation Summary

17 Simulation Parameters Radio Type MAC and PHY, 40 m range Node Density1 node / 256 m2 Mobility Rate0.0, 0.1, 1.0 m/s Number of Nodes50, 100, 150, 200 Query Generation Rate2 qps Query Start Time42 s Refresh Interval10 s Event Types20 Simulation Time300 s Events Detected10 / type Up/Down Duty Cycle[0, 120] s up; [0, 60] s down

18 Query Success Rate w/Node Failures (100 Nodes)

19 Storage per Node w/Node Failures (100 Nodes)

20 Further Scaling and Robustness Results Mean and maximum storage load per node decrease as node population increases Query success rate above 96% for mobility rates of 0.1 m/s and 1 m/s Query success rate degrades gracefully as alternation between up/down states accelerates Validation of relative message costs of three canonical approaches in simulations of up to 100,000 nodes

21 Follow-On Work in DCS Mapping geographic boundaries of a network; support hashing to inside a network with changing boundaries DCS without geographic routing: GEM [NeSo03] Range queries for GHT using K-D trees: DIM [LiGo03] Assigning coordinates for geographic routing using only topological knowledge (not, e.g., GPS) [RaRa03] Dealing with non-uniform node distributions; multiple hash functions [GaEs03]

22 DCS: Summary Three canonical approaches will be useful in data dissemination for sensor networks: local storage, external storage, and data-centric storage Summarization is a key advantage of the DCS approach in reducing hotspot usage and total usage; home node is a useful aggregation point Sensor applications with many nodes, many event types, not all queried are those where DCS offers most attractive performance vs. other canonical approaches GHT spreads storage load evenly on sensor networks GHT offers robust persistence under node failures and mobility, because it binds data to fixed locations, rather than to “volatile” nodes