remote object query for ad hoc computing environment n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Remote Object Query for Ad-hoc Computing Environment PowerPoint Presentation
Download Presentation
Remote Object Query for Ad-hoc Computing Environment

Loading in 2 Seconds...

play fullscreen
1 / 22

Remote Object Query for Ad-hoc Computing Environment - PowerPoint PPT Presentation


  • 105 Views
  • Uploaded on

Remote Object Query for Ad-hoc Computing Environment. CS851 Biologically Inspired Computing Presented By Qing Cao Computer Science Department UVA April 2003. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node. Smart Sensor Node.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Remote Object Query for Ad-hoc Computing Environment' - marie


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
remote object query for ad hoc computing environment

Remote Object Query for Ad-hoc Computing Environment

CS851 Biologically Inspired Computing

Presented By Qing Cao

Computer Science Department UVA

April 2003

background motivation

SmartSensorNode

SmartSensorNode

SmartSensorNode

SmartSensorNode

SmartSensorNode

Background & Motivation
  • Large Ad-hoc Computing

Environment such as

Sensor Network, etc,

has to be effectively controlled.

Challenge: How to

know where are the

Targets and Control

them?

Target

Target

Target

overview of this research work
Overview of this research work
  • A quantitative approach and analysis of the design and deployment of sensor network, with Guiding Parameters and Results.
  • A novel, biologically inspired control mechanism for sensor networks event query based on the results.
  • Result: A service-client Control structure for Sensor networks, especially suitable for security. Research results have been simulated and evaluated and a prototype will be implemented on MICA2 motes.
story begins
Story Begins:
  • You are a tourist. You are now in a forest. Now the forest is caught on FIRE!
  • So what kinds of tools can you use to
  • escape?
  • Helicopters?
  • Call for help? (cell phone)
  • And now , A single mote.
the complete scenario
The complete Scenario
  • The forest can be monitored.
  • The motes detect fire and deposit results.
  • The mote in your hand is used to retrieve

the results.

  • You use the results to find path out

of the forest.

main challenge
Main Challenge:
  • The query of the event in the network.
  • Problem: How to find the position of the

events in a real time manner?

inspiration from the biological world
Inspiration from the biological world

Termites send out pheromone to notify other termites of its current location.

  • Such information is

sent uniformly.

Directed Information

Sending might help.

inspiration from the biological world1
Inspiration from the biological world
  • Animals leave trails as the presence of

themselves, such as bees or mice.

Can we import this idea in large colony of

computing units?

slide10
Idea
  • Assumption: The communication range is larger than sensing range.
  • How this idea works…
  • Two different Algorithms.

Single Node Relay.

Lower possibility, less messages

Multiple Node Relay

Higher possibility, more messages

simulation results
Simulation Results
  • The density of motes to ensure coverage
simulation results1
Simulation Results
  • Conclusion :Communication range percentage is the only reason that determines how many nodes we need.
simulation results2
Simulation Results
  • The density of motes to ensure query
simulation results3
Simulation Results
  • The density of motes to ensure query (cont.)
simulation results4
Simulation Results
  • The effect of Arm Width
so how do motes intersect with each other
So how do motes intersect with each other?
  • Lemma: If a query arm meets with a service arm and both arms keep unbroken, then at least one node in the query arm is bound to be able to communicate with at least one node in the service arm. (Proof omitted here)
  • As a result of this lemma, there are two kinds of intersections:
  • Direct Intersection and Indirect Intersection
system advantages
System Advantages
  • This is a secure system

Since C/S Architecture is used, the user

must be authenticated to use the service.

Traditional Security methods, such as

RSA can be used to defeat any possible

attack.

system advantages1
System Advantages
  • The structure is simple.
  • It is application independent.
  • It provides basic functions ,

such as query, count, etc, inherently.

now how you escape from the forest
Now how you escape from the forest?
  • You have a mote with your user private key.
  • You send out the message which requests current fire locations.
  • Your request is authenticated by the sensor network, which is nearby, but you don’t need to know where they are.
  • The sensor system now monitoring the forest gives you the fire information.
  • The information is displayed on your PDA.
  • RUN, FOREST, RUN!
  • … from the movie Forrest Gump
slide22

End of ShowFor CS851 University of Virginia Qing Cao Presents

Conclusions This research work has proved that it is viable for large sensor networks to use the query arm and service arm mechanism for the discovery, query and even commanding of remote motes. We call here, uniformly, such events or motes objects. We have seen that this mechanism is especially suitable for the implementation of large secure and Client/Server architecture based sensor networks. I plan to implement this mechanism on MICA2, and a thorough study of the performance and evaluation of the whole system will come soon. Thank you!